Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe
Resource
win7-20241010-en
General
-
Target
fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe
-
Size
326KB
-
MD5
cb2f0bb88d5b11b5b7efc71f55ee8eaa
-
SHA1
e94f72af58ebf1806d276fda558f7d7d3748eb71
-
SHA256
fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270
-
SHA512
318c91505d0999cf89241d31a3a90394606b32c1fd6d271e3acfb46eb23d4efb6d4cd9db3e14ba915ffe24940b969bff3f20e32c112a89e63ce04e304254ca0c
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYH:vHW138/iXWlK885rKlGSekcj66ci6
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
goyqd.exefbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation goyqd.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe -
Executes dropped EXE 2 IoCs
Processes:
goyqd.exeirmia.exepid process 452 goyqd.exe 4276 irmia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exegoyqd.execmd.exeirmia.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goyqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irmia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
irmia.exepid process 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe 4276 irmia.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exegoyqd.exedescription pid process target process PID 2292 wrote to memory of 452 2292 fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe goyqd.exe PID 2292 wrote to memory of 452 2292 fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe goyqd.exe PID 2292 wrote to memory of 452 2292 fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe goyqd.exe PID 2292 wrote to memory of 5012 2292 fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe cmd.exe PID 2292 wrote to memory of 5012 2292 fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe cmd.exe PID 2292 wrote to memory of 5012 2292 fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe cmd.exe PID 452 wrote to memory of 4276 452 goyqd.exe irmia.exe PID 452 wrote to memory of 4276 452 goyqd.exe irmia.exe PID 452 wrote to memory of 4276 452 goyqd.exe irmia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe"C:\Users\Admin\AppData\Local\Temp\fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\goyqd.exe"C:\Users\Admin\AppData\Local\Temp\goyqd.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\irmia.exe"C:\Users\Admin\AppData\Local\Temp\irmia.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5a0ff66e357e350b422bc8a3e8cf7880c
SHA17841b2937304e6d684f0066f43b7a24873ba3b26
SHA256161080cc048732eed717b2cdae265a98ef72c55b24808338f10fa5237594c637
SHA512b468a81c00a704d67cd2df7cfcb7be9a1b62cb58c1d1e74031f0935917c46b02bc22ff3d003a7a6d98c2c5c741903578efe6c4db63396c8d61f6a2eb9c0148d0
-
Filesize
512B
MD5486c4d70fc573d3163fa1f4b9b5ebc39
SHA1e33cbd210768928595b773ba03cb3d954831f54a
SHA256ad1c959c1b17e9ec190d39761f7dcbf7d52468ae3ac567a7413f73d7a82c8aea
SHA512e0a42c792e639177252ac9e67faaa78048f7c446445dd108db9a2d3296112611ef61f417bd60ea5ad5bf5d88ab502f768b72c1d6dbf216db9c642bd605e42981
-
Filesize
326KB
MD5767c5a7831665676a7a46d9cf4a3b44e
SHA1cf083aa6e954800b7766fd2b0e3af5055f85fe07
SHA256eee047a8aa4eb1c8a35565931dbf1f8209e5a89293d46c1cc595a9efcc42356c
SHA512dcae92830b7704471618cab818ff5a537612fa5c2ab14c0a2f53e5da65d486f4cdc3bdfd879642a386e93669de78180092c425dc6f4418e005961295fe520507
-
Filesize
172KB
MD5ee4b1e0ff004f3e4ba4c96627ea9bd8a
SHA191ac4113337e93a47ca08b31e94aa3ef2b8a937b
SHA2569c860d0dfc4072af1db28a3595e2d5a27b90131bfa3e510a1e6156d8bc8fa5bd
SHA5123b6323c268956873baad80b43ac84a441359c95c539026afd346ba1a467cfa9a27b1d70e663de853ca339df2aa42035ebf82552a341b6e2f5dbbbf5103082cae