Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 22:03
Behavioral task
behavioral1
Sample
4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe
Resource
win7-20240903-en
General
-
Target
4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe
-
Size
426KB
-
MD5
e4534a106609e33002824af2f536a937
-
SHA1
29b956d5233e3b4f0b59382b53d798e1d1bce9df
-
SHA256
4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953
-
SHA512
4e9502bc121bfc303dbce61318a0d918d1850d5e1b1b2265ad0d524ffd2aec88a910919f7e644edbb3f8d8eaed66812259f6c6a1e78b29e16762b83e143f7258
-
SSDEEP
6144:WzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOdsc:YU7M5ijWh0XOW4sEfeOD
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral2/files/0x000400000000072f-21.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation obdem.exe -
Executes dropped EXE 2 IoCs
pid Process 3128 obdem.exe 4140 upxyg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language obdem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upxyg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe 4140 upxyg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4532 wrote to memory of 3128 4532 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 89 PID 4532 wrote to memory of 3128 4532 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 89 PID 4532 wrote to memory of 3128 4532 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 89 PID 4532 wrote to memory of 3760 4532 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 92 PID 4532 wrote to memory of 3760 4532 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 92 PID 4532 wrote to memory of 3760 4532 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 92 PID 3128 wrote to memory of 4140 3128 obdem.exe 103 PID 3128 wrote to memory of 4140 3128 obdem.exe 103 PID 3128 wrote to memory of 4140 3128 obdem.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe"C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\obdem.exe"C:\Users\Admin\AppData\Local\Temp\obdem.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\upxyg.exe"C:\Users\Admin\AppData\Local\Temp\upxyg.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD52e41ec5d0baa4ef76a82c0b0b1d8f58c
SHA16f93c7490b59dd92ed58e1406c0f8bdd156cb659
SHA2568ee3c8ac0b8815d68bdc39a1eb9d95e253e74cbe6e482ae91511ccbe2dc8d548
SHA512d27a2f296e27ae39cea7c8b12051dd6fd68ab932116235417db540d59fdad12e5522df52065f52c7bdbd2d85cb696e4f517347942aca876b8fad35b42faf0063
-
Filesize
512B
MD51e9f6ded2a91ab3befaa38215d9bdef7
SHA1cbac9c447ad620ff8e94bcaa2505972f1d8ecd18
SHA256feafd7ce26874b1c9b80daaea654499c1f14097a1430cf85340e4a53fe026a07
SHA5122c629cef4c863dd541e5453423f9d2b793209b306449ce77ada131ab19a25f0aa8c12505c1d85569a18a6c0e3734baf8b2938b624142a482e1b0730cae70aed7
-
Filesize
426KB
MD5b3588d2bddfdda5744314d2c8caa387c
SHA1663a38e2fd1d98b7a724a842b994084b1a01035f
SHA256cf9a3f57a3739ad626daf4d985e010635bea57e699d75b27809c95b085b6939d
SHA51256d7ea6e7f230744f34b07e862dfe6e30ab2c98ab3bd91c3398134531d10cdd8c5002f9c9ccf3211628a88472567b1dbe65c4ea8eee8132e28265b9612d346c6
-
Filesize
212KB
MD57d7a0834a5a3791dd9080a54179bd671
SHA1371bb6d860fd9c2d12c3eed40eff9861f24aebd3
SHA256087599f09c3289820d2d5789f2ffd1e4235fe7e011b4e8a32741bedced2016d9
SHA5120db92a3aa5d5382f30d39e6464e61c6de15ba3329c45c2e35dc8a0fe443616c9965e34e58b0853e464ef3d9b04f4654c2cb0a59d38001422bc551948fb905b5a