Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe
Resource
win7-20240903-en
General
-
Target
c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe
-
Size
332KB
-
MD5
dd283e263e2b0339bf8bb6a19a7ef990
-
SHA1
b91c87e5ca1573739a501f8bd91b041a1adbe82f
-
SHA256
c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884
-
SHA512
198932fada52cf3b8b908c634251a252a14e8118950222c490a3249004d6fca78acfdb1e789fbfbfca2425a0365561d7637c4307e1ec201d9bf72c65d0436b3b
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVb:vHW138/iXWlK885rKlGSekcj66ciEb
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation bedyy.exe -
Executes dropped EXE 2 IoCs
pid Process 456 bedyy.exe 4736 roiqp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bedyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roiqp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe 4736 roiqp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2004 wrote to memory of 456 2004 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 87 PID 2004 wrote to memory of 456 2004 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 87 PID 2004 wrote to memory of 456 2004 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 87 PID 2004 wrote to memory of 1964 2004 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 88 PID 2004 wrote to memory of 1964 2004 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 88 PID 2004 wrote to memory of 1964 2004 c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe 88 PID 456 wrote to memory of 4736 456 bedyy.exe 101 PID 456 wrote to memory of 4736 456 bedyy.exe 101 PID 456 wrote to memory of 4736 456 bedyy.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe"C:\Users\Admin\AppData\Local\Temp\c7ab6e6a15d869dadef52ff822aa8fee52a071fa7b1c98dd1bae8f8ea7018884N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\bedyy.exe"C:\Users\Admin\AppData\Local\Temp\bedyy.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\roiqp.exe"C:\Users\Admin\AppData\Local\Temp\roiqp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD512cc31e42f61ba51d1ef42b3dfd7dcad
SHA1feec1c4dd538f7e2a03b9a9edcb2ae38db9b9275
SHA256640d2e011c0789c0c436c6bd990adc5042a65341afd0d6c14ed099ba24de54ee
SHA5129c2fa7c203fdf61f1757462a612e45fdc975b651bb3a2c9d7d218400e6f087c01d86ed82b5dc446ec44644de06aad9dc54158695332393463bb7f86eaee8d8ac
-
Filesize
332KB
MD516b004ef0954d44ec845c8041b01ee3f
SHA1fd0ac6cf1d9de9dec6f4a833f05e9dac7a24031d
SHA25627a994449be6a3cfd2195f839857eaad27396a52a134271ec8dd2a96300340fe
SHA51274a94b48673c51300a909325705f8d2ad2239ec397a1e40e7f83650a0c7a268ba02e14c748c8debb69e072e6633960a4bc261755f51901b2afe80de08294a4bb
-
Filesize
512B
MD51f50c8076a4673ba50ee10e60567eae3
SHA1b77691a2de7234410f7ce12f6b831ee054be980e
SHA2561b5a2f753ccc6034681129e3411e4ef2d990ec5ec7263b5a5e64bee6e5176ae2
SHA5125e3379ceac824a970d4ba644d4df17a27164973468ff0dd7a89d092d3072e8b7d0f189b42dccdba7abb22e5d124b2d5105c15762ae1fc2606d8eb3e47328977c
-
Filesize
172KB
MD5d716afe95c32a8e426b7c28d8554d1a1
SHA1f99a16859a9b5d6454f6c2f895812ff740f20011
SHA256a5c775dfc65b4ccdffaae2bcc0938821b46c9c6c7b7a2b3fd0c54f800690fbfa
SHA5122a0295768f5d2786f39336b24c83e39dc01a7df94eadab715791a86d46afccfdef3b0d02e00758b3ea40834c44530ddcc2f4fd945c18d2baded6cef3ca1a4c3e