Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 14:28
Behavioral task
behavioral1
Sample
0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe
Resource
win7-20240903-en
General
-
Target
0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe
-
Size
413KB
-
MD5
315da296cc2c81f10c9e137b6b316320
-
SHA1
5fe9a2de322dcf39ce2bd1562460d79535d15db0
-
SHA256
0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09
-
SHA512
aa26148c3e82a12294fd9449cc0194cd7d283341c5a4b1f284b8fdcf16355fd2eab64fbd655084b9461234d6193ec374f88599c9be84241e1f5ab0325c31a189
-
SSDEEP
6144:tzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODsz:hU7M5ijWh0XOW4sEfeOy
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\tuuzo.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exehibox.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation hibox.exe -
Executes dropped EXE 2 IoCs
Processes:
hibox.exetuuzo.exepid process 4596 hibox.exe 3116 tuuzo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exehibox.execmd.exetuuzo.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hibox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuuzo.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
tuuzo.exepid process 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe 3116 tuuzo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exehibox.exedescription pid process target process PID 3640 wrote to memory of 4596 3640 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe hibox.exe PID 3640 wrote to memory of 4596 3640 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe hibox.exe PID 3640 wrote to memory of 4596 3640 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe hibox.exe PID 3640 wrote to memory of 2788 3640 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe cmd.exe PID 3640 wrote to memory of 2788 3640 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe cmd.exe PID 3640 wrote to memory of 2788 3640 0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe cmd.exe PID 4596 wrote to memory of 3116 4596 hibox.exe tuuzo.exe PID 4596 wrote to memory of 3116 4596 hibox.exe tuuzo.exe PID 4596 wrote to memory of 3116 4596 hibox.exe tuuzo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe"C:\Users\Admin\AppData\Local\Temp\0a2a211a254a6117a852d49f53b8b230aa9c3c0a8edcc7f36b489e1456f58d09N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\hibox.exe"C:\Users\Admin\AppData\Local\Temp\hibox.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\tuuzo.exe"C:\Users\Admin\AppData\Local\Temp\tuuzo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD58700b1a288ce7c6a0a12306d1c04ad7d
SHA188e89f0fd50791152eb1321891acc399be02b845
SHA256ae8c43a0e815ac53073c97749129abad18c566ec01b4f4177ffc03b754b8a25b
SHA5123c5efbdf8d176d4c15a80b5cfac8898721593c5e56ebe157e4edca4b77afea418d31dea5e30e6364881f64d23baad8e5a4a8e8da032c870cc8dff2625a5fc352
-
Filesize
512B
MD58033c07d7fad8f9e5842106f8ccb85de
SHA1c848ce33113b2005a30e7e9d81de94f0d8183a45
SHA2568021b3901e79163f24e4948cd5d0e91d0f41a7782c75216d3c994c82c20dfdaf
SHA512ddf6a13472319fc1cc38d8ecb22b9780998baf51d489983aaa4cffcdf0683dd4d207a3618e9c67db6fd3996bec275fddc3e0620131e925a2945415d28090304e
-
Filesize
413KB
MD576353acacb59215f5000270ba3e214a2
SHA1a5b36d6a76e3c6ef9eeb2d9e58e7fb1630fdfdf9
SHA256e7fdf2a77c3e4f8974d8dc3148e6fe89dba5fdd406451fccdd3a4178b4f7138b
SHA512228e40f1e81f07d9180d4bbefc7d585442338b50475feb6077f510f8448076adc650b2a42cda3a73d7373e0ea9ce02501b9061b339024e950c30449d26d64044
-
Filesize
212KB
MD52a6473e00cee5d2a34fd144f32dbe73c
SHA140e7c5acc8732920e346461db65d79bd4f3c04d4
SHA25669f135e3ec59842c5995b2f181b714298057901baa31a8757952142024f1e9e9
SHA51251cdc97cb3ff14ca75a50c35944d2578c2ad0da8df541a62a2e342ed04c892a269b593bd84e88602d3b99084452b3c66c26841f0128036db27cbfe8f43222357