Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 22:49
Behavioral task
behavioral1
Sample
511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe
Resource
win7-20241010-en
General
-
Target
511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe
-
Size
767KB
-
MD5
10d26efc25912c1a8778c55bca3e52d3
-
SHA1
3d37d07d76ac65d1b741f988cd054e39f13b1299
-
SHA256
511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48
-
SHA512
b890cd6f0c3c601328da33f1bbb2b5ff6ce46ac44b48edbb97666c6787ea15f6647475e88b3806a37def059cb452d2023dc0c7c2ebd1d8e4bf5c39f8c9b1f51d
-
SSDEEP
12288:Al+ZmuQEpbjNpTa9nzuRbBUHUpRAwHPf4us8v1TCo31rvMO8qgsgVIoSUhibNqzw:5jpUqBUKQubvx3FvM5qehib+f3NBmnbT
Malware Config
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation vukub.exe -
Executes dropped EXE 2 IoCs
pid Process 736 vukub.exe 836 vucav.exe -
resource yara_rule behavioral2/memory/3780-0-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral2/files/0x0002000000022af2-6.dat upx behavioral2/memory/3780-14-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral2/memory/736-17-0x0000000000400000-0x0000000000614000-memory.dmp upx behavioral2/memory/736-40-0x0000000000400000-0x0000000000614000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vukub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vucav.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe 836 vucav.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 836 vucav.exe Token: SeIncBasePriorityPrivilege 836 vucav.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3780 wrote to memory of 736 3780 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe 88 PID 3780 wrote to memory of 736 3780 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe 88 PID 3780 wrote to memory of 736 3780 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe 88 PID 3780 wrote to memory of 5060 3780 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe 89 PID 3780 wrote to memory of 5060 3780 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe 89 PID 3780 wrote to memory of 5060 3780 511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe 89 PID 736 wrote to memory of 836 736 vukub.exe 98 PID 736 wrote to memory of 836 736 vukub.exe 98 PID 736 wrote to memory of 836 736 vukub.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe"C:\Users\Admin\AppData\Local\Temp\511677b39d2ff65ba9ed5a6e3f40cc92966a43cb91c7ccc48593fab2521c8e48.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\vukub.exe"C:\Users\Admin\AppData\Local\Temp\vukub.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\vucav.exe"C:\Users\Admin\AppData\Local\Temp\vucav.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD57e8faf121ebd060bfbfd41c74053e865
SHA1e3efc982b1b4d1c8aebb6bb5cb5d98a56566766b
SHA25679280697856d004e520af0e6111062354406eab4d673aaf4694a610080e45418
SHA5122a8fa6cdc6046e296e29b82c69af06b0b3021edb662f74a6e42301a8defbef54b3b8e0b51cc748abdd0ea7a944cb911b270bd45d8f411cafc78f36468aa3872f
-
Filesize
512B
MD54e7b2a40e1cc44cbb236cb91360db54f
SHA103d53e6e9b19eb4e819dced46e6a7205ab903f7c
SHA256664003e331e9a6da7bba80116eb6d37d6cb334c423216ad5d07149489bf89c0a
SHA51229c3d1a3a0842d0f36ea8b833c3b3d3bbbd60bcf7575d1f6296639fec1b5e10162934757b4fa3e459e9d9f7bc9d64defe4b5e69556bc2c9bb5c192730103130f
-
Filesize
301KB
MD55db68d82dbe02076855844cb8e19c150
SHA15bda678b14997ba84157d94bde87d1719db4dd27
SHA2561de34f3c02dd1019ede4ce8f9a4c8d1a209bb483e14375b1c917fc74d0be40d1
SHA5128315c1ed1ac71d9033672b5e78608e504fdddd282fcf248778774954ecd5e0c71f447c29318dc9c06160a2b6d9b2f50f6d37de8cf4b84083fa1fe36c961aeb55
-
Filesize
767KB
MD5121c226f1cd33a6337efe9d4edaae620
SHA14fc44450f7f44f007b0c849e909092e1e1a77f18
SHA256661708d656b9f94e6e6b091a0534dc1c82e2855085de8d2a3afed971b0230900
SHA51294c7d7a8f466b0279e0b991c814a3fc0b6ed315381aad6216ee26862172f6eccdc3520f488d36771f50c8f87ef496592969db32b79e512db9590dee38f551539