Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe
Resource
win7-20240903-en
General
-
Target
c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe
-
Size
332KB
-
MD5
dd283e263e2b0339bf8bb6a19a7ef990
-
SHA1
b91c87e5ca1573739a501f8bd91b041a1adbe82f
-
SHA256
c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884
-
SHA512
198932fada52cf3b8b908c634251a252a14e8118950222c490a3249004d6fca78acfdb1e789fbfbfca2425a0365561d7637c4307e1ec201d9bf72c65d0436b3b
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVb:vHW138/iXWlK885rKlGSekcj66ciEb
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation fyogu.exe -
Executes dropped EXE 2 IoCs
pid Process 3184 fyogu.exe 3104 ritif.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyogu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ritif.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe 3104 ritif.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3184 2148 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 89 PID 2148 wrote to memory of 3184 2148 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 89 PID 2148 wrote to memory of 3184 2148 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 89 PID 2148 wrote to memory of 3928 2148 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 90 PID 2148 wrote to memory of 3928 2148 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 90 PID 2148 wrote to memory of 3928 2148 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 90 PID 3184 wrote to memory of 3104 3184 fyogu.exe 106 PID 3184 wrote to memory of 3104 3184 fyogu.exe 106 PID 3184 wrote to memory of 3104 3184 fyogu.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe"C:\Users\Admin\AppData\Local\Temp\c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\fyogu.exe"C:\Users\Admin\AppData\Local\Temp\fyogu.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\ritif.exe"C:\Users\Admin\AppData\Local\Temp\ritif.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD512cc31e42f61ba51d1ef42b3dfd7dcad
SHA1feec1c4dd538f7e2a03b9a9edcb2ae38db9b9275
SHA256640d2e011c0789c0c436c6bd990adc5042a65341afd0d6c14ed099ba24de54ee
SHA5129c2fa7c203fdf61f1757462a612e45fdc975b651bb3a2c9d7d218400e6f087c01d86ed82b5dc446ec44644de06aad9dc54158695332393463bb7f86eaee8d8ac
-
Filesize
332KB
MD5b5519d127a9c7e8431734c91b1f50869
SHA1317823780e201856ae78265d1580e9881477b753
SHA25619fe02ea490ad096793ce48c7e3906ca726d552baf228750b0e01acab2557221
SHA51294a59e56b6396c181040fc40425b121476623e72ed1003eb774dadc0733cb974853428fa168e9bd62447fcb2f1320162bf3bd1bc1baaf4d6668fa1f11b296e74
-
Filesize
512B
MD5373448771e3e27468f793c00a45c1e2b
SHA1824e3190b4574bf5588fdbb3d99d0bd7fdb8076f
SHA256137b6c9f2743ca044288da0d9dd0e114794efb6d7e40b8a2e8acdc76418f251b
SHA512cfd67ceb27d9dddacf5bf304917605573d8e2554c3a66079b4e26d412ba597d1d9bf714a41f19a9ecb793f06a1e39a2c5ca0ca627b20f456c1732b173e40dff1
-
Filesize
172KB
MD5c78abd97ce039cd67cb0a1aa4d4866c9
SHA1b0a065616559b76b0193b01fa5b447e7431630db
SHA256f9297c8a443763562b34eadec53933d7d6c198294ddda77c797dca2bfce1266d
SHA5129456cc25c80757e7969c232abb555e5aaba76382c52f9d0911acce92ed7dbe2aa2580798dc43b26f0e2a5f8c0bd61098d9a5225c5a82f0eac6a39d4ce45a5c33