Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe
Resource
win7-20240903-en
General
-
Target
a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe
-
Size
332KB
-
MD5
926d44f877c6b8877309b7dc186c5650
-
SHA1
d21eb91f9d20bb0d3a3ccd5edd4dd48d900a54df
-
SHA256
a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429
-
SHA512
486b60f8b1ee93f7b52f8f911e4284b7c384a23a68e4736d5fd6b9dd97c1be5cae23f24fce95f11c98e954bfb029ef55d84bab57dcc9fbbeda6a61e4b6548fc2
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVO:vHW138/iXWlK885rKlGSekcj66ciEO
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exefeeba.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation feeba.exe -
Executes dropped EXE 2 IoCs
Processes:
feeba.exeurgyq.exepid process 460 feeba.exe 4956 urgyq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exefeeba.execmd.exeurgyq.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feeba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language urgyq.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
urgyq.exepid process 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe 4956 urgyq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exefeeba.exedescription pid process target process PID 2040 wrote to memory of 460 2040 a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe feeba.exe PID 2040 wrote to memory of 460 2040 a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe feeba.exe PID 2040 wrote to memory of 460 2040 a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe feeba.exe PID 2040 wrote to memory of 436 2040 a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe cmd.exe PID 2040 wrote to memory of 436 2040 a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe cmd.exe PID 2040 wrote to memory of 436 2040 a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe cmd.exe PID 460 wrote to memory of 4956 460 feeba.exe urgyq.exe PID 460 wrote to memory of 4956 460 feeba.exe urgyq.exe PID 460 wrote to memory of 4956 460 feeba.exe urgyq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe"C:\Users\Admin\AppData\Local\Temp\a75ad7afda019d2648d07451bdc13beffe0afe240b2def24e3312e6c9eb51429N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\feeba.exe"C:\Users\Admin\AppData\Local\Temp\feeba.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\urgyq.exe"C:\Users\Admin\AppData\Local\Temp\urgyq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5954d08d6a12a118077cfc71bbd9a60fa
SHA1491cfe3cdcced90d2f7ca27c1ec8ea91688b2c99
SHA2563f273f97b5095a089cee89df487b2b61ac558141aa852f98e51cdb7e294156d7
SHA51201008c5e95943cf07ba1cf03d58a0f26081207709c101b51cac0941feb4ba18cc1d9b40958ef2dd488b53abc0789ae34514ad340e588ac00450534c28f3c63e6
-
Filesize
332KB
MD5ce9f611a89b8e87954204dbba7ced512
SHA1e013a06a813ced44bc2864ec743f96d4ff3653fe
SHA2561e5e86b143dd1bba6ac752ba8ddcc132c88750e9eeff7623f079b9006449327b
SHA51218e523a503f43f5fecdff3b110e85374381c46605fae47a7a1f4f2525d2272c0e5e9d4acaa9262ab1f3af74c1d887d4c72e411ae95640514ae1d9c147ab93b1c
-
Filesize
512B
MD5b9a56f3cd154cb016cf0d1dffc5b98d9
SHA16ece253d819d6756dfcb64fbbb150a19f324815c
SHA256607aaea2e4e3b95c5755aef420ff7ce896aa15eb8e7b2552d8e3452144fd11c3
SHA51275cde4f4b37bead2c3431e744d7473662c2d336e473ae5d295664a0818ff4dff2bd5a55a71d70d43223a906cd17e698acf389d8b6c3eb5c179a9b9d526fad376
-
Filesize
172KB
MD5ac46ffb31ffdc6be35c50d0f0bf376f4
SHA1a83bbb77f4b31b31c533c369bb787205a6aabbea
SHA256744d7f1790c5c4d959030f111f76107f620f0d16da05c35c2c092260bdf1e13c
SHA512aa1ab18d95f50bda3dced1c2a8f17a65f44775e33d669610fd2d3942e139f65d33e958f646e48d258d9b06d4d9cb05c405bf4da2aeb8d88558043537d7b455b9