Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 05:37
Behavioral task
behavioral1
Sample
a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe
Resource
win7-20240903-en
General
-
Target
a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe
-
Size
557KB
-
MD5
4622a1c2bba867048cb806ad43f8e3d0
-
SHA1
11f7083f9d3d1c03539175920d43c9d3dd23a72b
-
SHA256
a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4
-
SHA512
ff3c7aec51ff2d35faec5b7ca430183339c5158fe208be708c1518c123a7a231c2de0e811efc23051450b0126951e8b6234faa52a36a835f388b70c677a96777
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEyP:znPfQp9L3olqFP
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation lywue.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 lywue.exe 3992 qycur.exe -
resource yara_rule behavioral2/memory/1420-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/files/0x000e000000023a68-6.dat upx behavioral2/memory/1420-14-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/2804-13-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/2804-17-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/2804-28-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lywue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qycur.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe 3992 qycur.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2804 1420 a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe 89 PID 1420 wrote to memory of 2804 1420 a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe 89 PID 1420 wrote to memory of 2804 1420 a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe 89 PID 1420 wrote to memory of 3472 1420 a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe 90 PID 1420 wrote to memory of 3472 1420 a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe 90 PID 1420 wrote to memory of 3472 1420 a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe 90 PID 2804 wrote to memory of 3992 2804 lywue.exe 107 PID 2804 wrote to memory of 3992 2804 lywue.exe 107 PID 2804 wrote to memory of 3992 2804 lywue.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe"C:\Users\Admin\AppData\Local\Temp\a2d9f8c6c5e1e053e517debda840f2bc378caa1d2e2cadbfaa91d949406e7cd4N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\lywue.exe"C:\Users\Admin\AppData\Local\Temp\lywue.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\qycur.exe"C:\Users\Admin\AppData\Local\Temp\qycur.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD59cf7ac7e50996aefcbc907ca75b9698e
SHA17ca3b2d2b64ff07e7cde2129370bbc0b53500e79
SHA25611611bcf4151395df19ef76e3d857ebae1d34127ade1e7368143618244dcbaea
SHA512facff2c52ad39ded9df69712db4be8965f5ee7ef736f42578bd081fbfed9ffba1202de4f1ff99764d60db9154e5a6032b3041730da547e4659297a48666cda17
-
Filesize
512B
MD555e36c50f1edb83985acca95c9934540
SHA15ddcd32e4806eb4cd37dd863cce53aea7b5c5ca5
SHA256138e293d5b1ce63fe390be826bc263338bd40bb72bae53393fca55a43ed1e545
SHA51267b0ece72e798a3488c02046b1abffb7fe8ebb1b03bfb319114e0984e1bbaaa4d54007339e7dcca475c0660411cf3d1dea239317d6fcfb70c3fd1a7811cb844e
-
Filesize
557KB
MD5f4f655297d4cfc6e63dbb2d82cd0e34b
SHA10b231d092d976b72c0c53e63f6a8d0e23099e6d8
SHA256e2355e44111c5839efb626b3fcedb14e5f08f3857ea9901dc22a526e5ab19b69
SHA512a9948f686423718c80163f489e997c17d52ec56f42b538866e72ffd8cbb88142cde6b0abc5d981ffdd0730199363922e0052db5c9085bbd723c68825701ec54f
-
Filesize
194KB
MD58325697f3d3e5765c0f66744519a2b0c
SHA100b4263755cba369fe3b91e42a4a69cc05be86ad
SHA25616265b783e4e4524fc4a4b9db5ce2c691f2b36dbc1517d4a88664a20fa3a993e
SHA51258b94465504fecd4e94414f54b2d2d712e9c655f4c2373660d0b963945352232d22e2e45732930ffb6b37ce9925967ecabd5f51a6729f21c7a7d97f1786f2fc3