Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 10:30
Behavioral task
behavioral1
Sample
36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe
Resource
win7-20241010-en
General
-
Target
36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe
-
Size
409KB
-
MD5
dd27974b04f29dd7b43ce92dae43cd90
-
SHA1
21ba560271aac3e1d2548a68594ad848918b92d9
-
SHA256
36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babb
-
SHA512
f29513f26c39141026d72cc15eb649d6b041aaa99d907ac7054836a8325bc0fa07b1152d687dff2d2d47031b9c7d404bc7fe7d12cad69822974daf6b0d9697eb
-
SSDEEP
6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOY+:eU7M5ijWh0XOW4sEfeOz
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral2/files/0x0003000000000731-21.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation juahq.exe -
Executes dropped EXE 2 IoCs
pid Process 4256 juahq.exe 316 jutys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jutys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juahq.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe 316 jutys.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2780 wrote to memory of 4256 2780 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 88 PID 2780 wrote to memory of 4256 2780 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 88 PID 2780 wrote to memory of 4256 2780 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 88 PID 2780 wrote to memory of 4736 2780 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 91 PID 2780 wrote to memory of 4736 2780 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 91 PID 2780 wrote to memory of 4736 2780 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 91 PID 4256 wrote to memory of 316 4256 juahq.exe 103 PID 4256 wrote to memory of 316 4256 juahq.exe 103 PID 4256 wrote to memory of 316 4256 juahq.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe"C:\Users\Admin\AppData\Local\Temp\36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\juahq.exe"C:\Users\Admin\AppData\Local\Temp\juahq.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\jutys.exe"C:\Users\Admin\AppData\Local\Temp\jutys.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD50d4514c1d29cc90e6c386266520c81d5
SHA1505a6c72c47b3044379da558211a2fff546da277
SHA2564721a3f937f6452d73c2fc4e49a28d93a5b3275d8d6375f1ce7dd96fc4beadb4
SHA512a0a6df796d9a10800e57f65b3c4a2248315e9b838e6d0f568c2ee7e13c15fcdd4e2b150acf9d46da1e919429fe442a419825e63ae9e3d5ac59297b83fe0db571
-
Filesize
512B
MD58ae9fbab514159b39125aef58c56e617
SHA167aab6aee0b75208681bc34431d871affa96d540
SHA256069a30be29ea2afc5437d2b1b207826f535684aeac736f52ee184635771b4235
SHA5128ac3b3cae08ad9c9b18e03a1b4af7eb2d5674d3d70ac3322f69b56c81ca86da4cf92d1a6c4f06e3907ea8a9a41c59c9f07b24584f0f7dbd9b8927d821c1eb237
-
Filesize
409KB
MD5f7e4985cf02448f7cbe20bca07e8b4c2
SHA18bd34b5ae6adb54b6dee642c6ce458fd11aaaf5e
SHA2564f576587036071dcd8a33da25513e4f8ba15967e0fe5cdeee372d42c2a61fcee
SHA512cd3073cd7caeb608cad7dafec543486c6f2fc3758e3294476b4fad9771fb6d50cd149d3d6bdef0cfbc46b059e4293649340eded070f9f4c78729e6c698c2feba
-
Filesize
212KB
MD5875ac920a0139dc5e72e2f7c9631b2a9
SHA16253134d6a90d06e0834d7abe37c9e576c2a0574
SHA256fe68f20f4e554b554f168672347c7eb3a1cd61668bba01ba2d3c9d1e6795d860
SHA512695172b4037ade3c6b51338da330ffef3599d326737439d5f163707bec18acbe1ae7f2bb102e6d144357106b6e06c5f140f70dd25440138f22d21b0b8da89cdc