Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 10:32
Behavioral task
behavioral1
Sample
36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe
Resource
win7-20241010-en
General
-
Target
36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe
-
Size
409KB
-
MD5
dd27974b04f29dd7b43ce92dae43cd90
-
SHA1
21ba560271aac3e1d2548a68594ad848918b92d9
-
SHA256
36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babb
-
SHA512
f29513f26c39141026d72cc15eb649d6b041aaa99d907ac7054836a8325bc0fa07b1152d687dff2d2d47031b9c7d404bc7fe7d12cad69822974daf6b0d9697eb
-
SSDEEP
6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOY+:eU7M5ijWh0XOW4sEfeOz
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral2/files/0x0004000000000733-20.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation uxize.exe -
Executes dropped EXE 2 IoCs
pid Process 4800 uxize.exe 2016 bupuk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxize.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bupuk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe 2016 bupuk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3120 wrote to memory of 4800 3120 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 88 PID 3120 wrote to memory of 4800 3120 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 88 PID 3120 wrote to memory of 4800 3120 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 88 PID 3120 wrote to memory of 4404 3120 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 89 PID 3120 wrote to memory of 4404 3120 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 89 PID 3120 wrote to memory of 4404 3120 36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe 89 PID 4800 wrote to memory of 2016 4800 uxize.exe 107 PID 4800 wrote to memory of 2016 4800 uxize.exe 107 PID 4800 wrote to memory of 2016 4800 uxize.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe"C:\Users\Admin\AppData\Local\Temp\36f5ad635241a703e62e5db25b86437afa5ac3e627ad8d453d61c6af9510babbN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\uxize.exe"C:\Users\Admin\AppData\Local\Temp\uxize.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\bupuk.exe"C:\Users\Admin\AppData\Local\Temp\bupuk.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD50d4514c1d29cc90e6c386266520c81d5
SHA1505a6c72c47b3044379da558211a2fff546da277
SHA2564721a3f937f6452d73c2fc4e49a28d93a5b3275d8d6375f1ce7dd96fc4beadb4
SHA512a0a6df796d9a10800e57f65b3c4a2248315e9b838e6d0f568c2ee7e13c15fcdd4e2b150acf9d46da1e919429fe442a419825e63ae9e3d5ac59297b83fe0db571
-
Filesize
212KB
MD50472fbd53b09368525f1aca8729b0932
SHA140a24f9702ba8b1acbe36987917ebc05c98bf51b
SHA2566ee0c73b717b604264f9d95675204b0ddf306203893fe6fd9eefa2ce6c0325de
SHA51284e68b68c866674fbee2ee3ef7130ea49e92cbeabde841cbd55de753c45bc32b8075c30d59657daa82f8b0c965fc431e412db547c70f6b05daba6950c324ef64
-
Filesize
512B
MD5ddd58d0b420343badeb83a06d4410d74
SHA1a89ad217c6e377d39608b12e1db17460d2b3b78e
SHA2569902b09f3992f77de76178d0f0a705da3be001b33ee9c150c19436843512799f
SHA51251dfdb333be994ca19a1bd60d27ad4c2655afca84861d2158772ce4a36daa5b917289114293675e5148f0427ce763c4c2e207a3a3722aee9db02a141b6f98bba
-
Filesize
409KB
MD570f60a5dd60fd5b81a9d6ac54bf121b9
SHA10faf4902433c72ab86cad88e4eaff3b82d7c6397
SHA2564169493f28b54e019a73fc591b6c5453fc3eca3bac0640d931f478b54a298dd6
SHA51242e417f57d6d0079f6028de5a1961d7a04d8e2643893d0051cc606df25f257cb4584ace489c5623b41d086127eb3d6e57cfc054908c7224224ece65da8918d0c