Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 21:51
Behavioral task
behavioral1
Sample
083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe
Resource
win7-20241010-en
General
-
Target
083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe
-
Size
535KB
-
MD5
a9a26bab1a8605aadb5e6cc177df9300
-
SHA1
90256a8a70cb8b4d48bce16e9ccd93349f206d8f
-
SHA256
083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0e
-
SHA512
614485e8750052eefe509971fa2e0b9a426c88b231d1322fe84048fb211148282f713d83e6edc140ef25cd69f8b88c692c72ed7ab463d2a19726b470f3fc63b8
-
SSDEEP
12288:q0nPhglq2Uyt4R/b2G/0hznQGoexBU/NPK:q0P/k4lb2wKatK
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation uzcob.exe -
Executes dropped EXE 2 IoCs
pid Process 4692 uzcob.exe 5060 vokub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzcob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vokub.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe 5060 vokub.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4692 4888 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe 87 PID 4888 wrote to memory of 4692 4888 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe 87 PID 4888 wrote to memory of 4692 4888 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe 87 PID 4888 wrote to memory of 3628 4888 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe 88 PID 4888 wrote to memory of 3628 4888 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe 88 PID 4888 wrote to memory of 3628 4888 083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe 88 PID 4692 wrote to memory of 5060 4692 uzcob.exe 107 PID 4692 wrote to memory of 5060 4692 uzcob.exe 107 PID 4692 wrote to memory of 5060 4692 uzcob.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe"C:\Users\Admin\AppData\Local\Temp\083f1d8c2a1a7ff69600c5a60d23bc2b66bb4853384a3b13a4ddd1ef863aeb0eN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\uzcob.exe"C:\Users\Admin\AppData\Local\Temp\uzcob.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\vokub.exe"C:\Users\Admin\AppData\Local\Temp\vokub.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5e225c057d30eada45a10d1267c39f94a
SHA1b63bfbde9a619357cff7bb27b16622c32e6f4981
SHA25681c1b3dc48af46abf39174c16d338a87f249345362d9253324c54eba2ea4515d
SHA5128b51a227341a8ab5e5756acbdb1214dbcced44d906bed0f1256784ab2c7e6362a8b850437f4e7b202ffda6f549afa7c29b11aa8019e30935756f074bcf849366
-
Filesize
512B
MD5ac6216929c52754cf34f5fe6c01ee82f
SHA1ebf5aa80b57044f61837265a9f9c7da21da922d0
SHA256cf84c4b060bb4634e69b43aa4418d04cc5cda55bd1e1e79375890b26f51969d5
SHA5123b19eac822df613719aadd203a0ada5f614ecc39c6b72a8c42aa5c015a760f01c8790e04de00cb6333718c94ce5bfbd498c7336460b108231e906c4d25b75c17
-
Filesize
535KB
MD5bd4fa71e9a183ee15349bce949431a05
SHA1df3e936eb603c931f1babd7e845ec503e931307d
SHA256db0092c481081de0e52443d27609cada5cd5552e8afb52182debe6b1cbf8c837
SHA512ca63241b9646c5deb0c6d3f239d44be86387c97a501db79dba407453b5cb55d43fa6bd2873cda96971f9559b31608c491b531fc23898931cf7ffb6019f6d049c
-
Filesize
236KB
MD5b756b5c99e0ded93b3fc67bc884af280
SHA1c646c43c327b8e42290b639bb8db63db30b758f0
SHA25689cf979b586215eaf08944c265b8b909d758e77107d0de9e84784ae003b3bc37
SHA512fa8a70ddc73110063a92248000aa07762b7e643fd5d51a488a1cf65576dccf29c67c5b512d684bf07a8955c53ae85c2720cdd1b5c5b24cf49878cc42f1c31343