Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe
Resource
win7-20240708-en
General
-
Target
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe
-
Size
334KB
-
MD5
7a181789d0257b40a159ab4696ebdd80
-
SHA1
5ba1408568657c069093a923ec223f05c1465789
-
SHA256
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804
-
SHA512
0873dbad88af0dfdceb5161ec1eaacbbfaf690676cc1743b037a2fa80fad0a6f07c51df8df54ff7b66666fafaec6edb890c40464c353ac49a4a2ed66f51f849f
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYPT:vHW138/iXWlK885rKlGSekcj66ciK
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exexoicb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation xoicb.exe -
Executes dropped EXE 2 IoCs
Processes:
xoicb.exenifyk.exepid process 3904 xoicb.exe 2880 nifyk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exexoicb.execmd.exenifyk.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoicb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nifyk.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
nifyk.exepid process 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe 2880 nifyk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exexoicb.exedescription pid process target process PID 4452 wrote to memory of 3904 4452 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe xoicb.exe PID 4452 wrote to memory of 3904 4452 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe xoicb.exe PID 4452 wrote to memory of 3904 4452 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe xoicb.exe PID 4452 wrote to memory of 4132 4452 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe cmd.exe PID 4452 wrote to memory of 4132 4452 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe cmd.exe PID 4452 wrote to memory of 4132 4452 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe cmd.exe PID 3904 wrote to memory of 2880 3904 xoicb.exe nifyk.exe PID 3904 wrote to memory of 2880 3904 xoicb.exe nifyk.exe PID 3904 wrote to memory of 2880 3904 xoicb.exe nifyk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe"C:\Users\Admin\AppData\Local\Temp\51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\xoicb.exe"C:\Users\Admin\AppData\Local\Temp\xoicb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\nifyk.exe"C:\Users\Admin\AppData\Local\Temp\nifyk.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5dfa98e3c887f69b92ca241f39102d10d
SHA1bf08c1c8e7394cca6ac430e7e4ea89c9f1e21f47
SHA256c06c318b9f96a11467e5201b10e26f75259e81fb12ad11b1c9adb80ab4b43bfe
SHA512b323d649e87a395e67958f54835a9f4b6794bb4a80da7f19612c78bf9fe77d801e185380da1ee2e9340e60292cf1f7857d97d3e235125bd7c238f5aa47c8b287
-
Filesize
512B
MD5ac32409d1ecf91b11352698ffabc01f1
SHA18bbaff612b2ab1b759d3d90d5f80540cfc2e41f8
SHA256860473704d63374e5644f4519c73db762d71280ed8e2d51dc90a24b0b4a91261
SHA512fbbaaef6d24137fead12c402363794fea665014859d87166a4e5653382fc00191cba4ff4206b65042c46729ff1c954455d1f046909d5bd53f0d5402fe21f2f9b
-
Filesize
172KB
MD53cf2b0add8d77df1daadffcea0d0b275
SHA1bc907737dd30dfda00aa4cfd63fff12dedecc50a
SHA2565a65b6f0394482baa564e4a5fe0ac043191575c76a5310ba93f38abcb493dd94
SHA512284117c87e3ca086877d9149999c6803a86db24add32c8674a3b8cc05ceb263f8f28375bd9a03492f09fb182e5524696792b3a56175fa105101c1af50a173d01
-
Filesize
334KB
MD57f517c5e818eba66315e9ac18b2bcd77
SHA17ab8ee274c28677c0c7db3ae9cb1c7fffea81c0f
SHA2569c6c95ab70d2809d8fbfdf03714e2078ca22f0d959977058f4d2a81dff39ef01
SHA5122b9366f883953917db0d78e1aa75e4f983f39e578dff4fd9b57b11044ff42d43aebae27b9013663f44f6bc0fa2a84781d1d085be051ebc45662ef087656b81b9