Analysis
-
max time kernel
119s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe
Resource
win7-20240903-en
General
-
Target
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe
-
Size
333KB
-
MD5
8dd4853010e7db531898aa198b116300
-
SHA1
839c24033a06b4f9ff2abd065f12cbdec61d83e0
-
SHA256
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f
-
SHA512
1be5cbce7454acf89b94ec27ef1f9c74c3a8ef53bb6a93dc3ca9243ef9a5d612b1400d7215a4107e95512f7f073c65e3ba7d90f735db74c990830acf0444b5f6
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9W:vHW138/iXWlK885rKlGSekcj66ciWW
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation xymui.exe -
Executes dropped EXE 2 IoCs
pid Process 392 xymui.exe 1996 odkyr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xymui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odkyr.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe 1996 odkyr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 316 wrote to memory of 392 316 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe 87 PID 316 wrote to memory of 392 316 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe 87 PID 316 wrote to memory of 392 316 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe 87 PID 316 wrote to memory of 724 316 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe 89 PID 316 wrote to memory of 724 316 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe 89 PID 316 wrote to memory of 724 316 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe 89 PID 392 wrote to memory of 1996 392 xymui.exe 102 PID 392 wrote to memory of 1996 392 xymui.exe 102 PID 392 wrote to memory of 1996 392 xymui.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe"C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5fN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\xymui.exe"C:\Users\Admin\AppData\Local\Temp\xymui.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\odkyr.exe"C:\Users\Admin\AppData\Local\Temp\odkyr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5e5991d6a36d31e5178c54f63402b6940
SHA11e433727b4d58f6b33c378dd127977e304b51d0f
SHA2567c0d0958b7fb9cacf1f670f1ad84511da0a6f2f0a53a3b4b0e97537c2ea62965
SHA5126653b0569e69da972d1c6222df92064dc665cf0aa1da18dfd3496c1aa4bae56c94df271c46e5d7fdacabb15e0a64075a8c01ed6211c5efc60a47b8d7b39ab89a
-
Filesize
512B
MD5ac6e3b6b9f540453743c31a3b5910b64
SHA128c3bd2264eac66b707796722cca2b9cd6329f05
SHA25600566d92a6b845290de4a6511e0b06ffe481c273dd8dba97a70d8c7c21eaf761
SHA512f9d7664307cff746d2a4248ba6f084b3e9548140a60d7b21f5e6edc14608d719ef9e7fe25789f56f9dad4e564794640262390104e1e443c2e685535376aa0429
-
Filesize
172KB
MD57519c60f7363dcae1e5d91ccc27afc2a
SHA1c31672c3843f454900fe1ae8bf4c384b8fe06cae
SHA256ec4afd6b8b140ee3d9d2560fe1f968974276b7390a7f94b001d882b8a050e0f6
SHA512fa898439f6735d50287d3b18119519e44d8c87574700103b61093bf22bdb4337502e0881930e06f15b31ba6b0c311ed59c7895b63ab4689b7e68101bfcea2308
-
Filesize
333KB
MD5c30577cf03ceb1ce053f997e744ff242
SHA16c2124fd816e731d49243bc5082c3f269c8500a2
SHA256646238e3bef3fb3badac48a204e907b98ba04f607db19635fc1ac73d097a739d
SHA5124ef2db623ec8a4948afbd9da43b50934e986aacdaa0e0bec48b5e629d8b68eefa2b7b637a87b77b27ff9b0061b924cd1ea59d3587203866b8001786f783487f4