Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 00:00
Behavioral task
behavioral1
Sample
72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe
Resource
win7-20241010-en
General
-
Target
72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe
-
Size
264KB
-
MD5
e68b9afabc211e801788560b1e3c81db
-
SHA1
a963e92f4db0ea49b7c512358c6c137aab1b6304
-
SHA256
72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831
-
SHA512
c7c39bdaae1ae83960755725956359423ade85943d54f6ea0cb57a2f1115e5b2716ae50a15b34b6c51d7c5ecf3050b19bfb5ad7e2f86c0269664eb5e87da00fc
-
SSDEEP
3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANaI:ASeyGpTaesaQUufkL57YsL9NIx9ANaI
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe -
Executes dropped EXE 1 IoCs
pid Process 4052 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1324 wrote to memory of 4052 1324 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe 88 PID 1324 wrote to memory of 4052 1324 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe 88 PID 1324 wrote to memory of 4052 1324 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe 88 PID 1324 wrote to memory of 452 1324 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe 89 PID 1324 wrote to memory of 452 1324 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe 89 PID 1324 wrote to memory of 452 1324 72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe"C:\Users\Admin\AppData\Local\Temp\72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD54514d58bb3af5fd2132870ab9e2897d9
SHA19bf67ec19026e2485416a37315a32a19972a69ff
SHA2568bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8
SHA51207941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738
-
Filesize
264KB
MD52d6958d98af55b826319fa1ee4755e45
SHA1ee7679215c5a9f8f18f4e5ab96061480c8f87a89
SHA256e8aca0ca8c7ac4c4a519cdacb7e3a13ab65acf3f33153f31a3f8827d503c2ebd
SHA5120f30513eddde2e3855b11e72c11f7e660b6bef27ae0c85e8f4ebff8be6796016f752d1aae9e1b0c83888702733f0b9bf5dbafc70debc39ac39c11b5a1d7721d3
-
Filesize
338B
MD5ac5deac1f3182ec87b592e20a7491a10
SHA19401081138e727384149838c3ef2c0e7fc7cdb6f
SHA256c8c5b8a1cf677f252f16b5d16b39475fc964311b83bac4c2d33ecc8a59ec13a1
SHA512d1bd8d83240351d315045396fbc89b0fd2d0c5f6ef6db1b4efa2ad2886c1168f4bb42191f60387d32740098fcf775363b9242defec949645dd5006e047160390