Analysis
-
max time kernel
119s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe
Resource
win7-20240903-en
General
-
Target
4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe
-
Size
333KB
-
MD5
af649e88296ceb9e1d695358491cc750
-
SHA1
830da14bc248fa18205b5a0cbdb812734ca69b58
-
SHA256
4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703f
-
SHA512
95bf144918ca6ccbfb7d9598f8f35e466cc92231c2cdf83675fc95ef5c75a56024f3148801850e4acf64ba7e00d361db3edf0aece87dcb27c3e57e623e57190a
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYPy:vHW138/iXWlK885rKlGSekcj66ciz
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation zixut.exe -
Executes dropped EXE 2 IoCs
pid Process 2240 zixut.exe 4908 ikduw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ikduw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe 4908 ikduw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2240 3968 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe 88 PID 3968 wrote to memory of 2240 3968 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe 88 PID 3968 wrote to memory of 2240 3968 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe 88 PID 3968 wrote to memory of 2200 3968 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe 89 PID 3968 wrote to memory of 2200 3968 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe 89 PID 3968 wrote to memory of 2200 3968 4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe 89 PID 2240 wrote to memory of 4908 2240 zixut.exe 102 PID 2240 wrote to memory of 4908 2240 zixut.exe 102 PID 2240 wrote to memory of 4908 2240 zixut.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe"C:\Users\Admin\AppData\Local\Temp\4fa8b7e45fd010a9bd8c8492484828e257d22012af34db7da5331446f322703fN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\zixut.exe"C:\Users\Admin\AppData\Local\Temp\zixut.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\ikduw.exe"C:\Users\Admin\AppData\Local\Temp\ikduw.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD551eb60591001633f51a3690f0d69b21c
SHA12c5ab7a2e840ff3b4a81c85dd668ff6908dd31b3
SHA25600b3935a5e5c00cc5640df9e92aa90903353835e2e1371adcd507be48aa3bdf7
SHA512de8273739713c511957d81e151d4109d17a9d7d6f5322bf166869ad8a8f90d38b96586523009d6bcf425c257709131de69a0fbbb99209b533eb330c73836a217
-
Filesize
512B
MD54b55f51e62ff3a83914be283fe17174b
SHA16da88a2c0c6bb8c7cefc02444ca9a1bf10838fc7
SHA2566ae8a9413531e3135b816faa76ec2f36c74f6d4965c5212089980e18346c1b0d
SHA512f7134c517d5c56451cddd8ef9175e564719e4070758fa519e25ad8a4e69369c6ea1ef0a462a6f0d17da4a563a5c6b98fa07faeb1537869fe6333668b1fcce367
-
Filesize
172KB
MD580efd46e93049ea7417a41d6d5abdfa6
SHA1faf4d8fa78c38c5022a8f977bc4d619b824a02af
SHA256fad95f366e86638a8150a98c0df946ea0099c32fe9ab61d861f777c804d308f9
SHA51251cbdbd9362e05ac48a9de00f5281f65d85c6eb6137de2ce37025003b37ac6eeb64a5a5c066190c34ec9ed116b6b5703515f3d4276a1fa769e941f06716eb1a2
-
Filesize
333KB
MD5167cfd11e1c73fb74ed4a1832401d287
SHA126949522c2d3d44756ff7351622b63d83681d6ea
SHA256db210e95a2417d059f721ad15a521946558c0970b962c2ba2e86702ed7b20818
SHA512b439ef7fd68595961eb7c787a59839fca645e3eb8d9d8cb0768b8937d9cc6caf9d316511558ee66a0f2dcb7744cc082e9def55057d596c21bd24c388cf115e78