Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 04:35
Static task
static1
Behavioral task
behavioral1
Sample
fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe
Resource
win7-20240903-en
General
-
Target
fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe
-
Size
326KB
-
MD5
db3ef99e9fb2072690240efd726fafd5
-
SHA1
6995f9f7d27d7485c13a781e12466b4dd258d58c
-
SHA256
fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da
-
SHA512
1af6e04d2128b3b5d4ac089e4519de22a9e3da3f08c05376678c16bf960a7c8d1aa866bf0ea81e6d5a00e1c806363b0392d3f74173865b4c67cfa84255d64477
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYO:vHW138/iXWlK885rKlGSekcj66ciP
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation vobui.exe -
Executes dropped EXE 2 IoCs
pid Process 1380 vobui.exe 1576 zapob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vobui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zapob.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe 1576 zapob.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1380 1208 fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe 86 PID 1208 wrote to memory of 1380 1208 fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe 86 PID 1208 wrote to memory of 1380 1208 fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe 86 PID 1208 wrote to memory of 3012 1208 fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe 87 PID 1208 wrote to memory of 3012 1208 fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe 87 PID 1208 wrote to memory of 3012 1208 fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe 87 PID 1380 wrote to memory of 1576 1380 vobui.exe 98 PID 1380 wrote to memory of 1576 1380 vobui.exe 98 PID 1380 wrote to memory of 1576 1380 vobui.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe"C:\Users\Admin\AppData\Local\Temp\fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\vobui.exe"C:\Users\Admin\AppData\Local\Temp\vobui.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\zapob.exe"C:\Users\Admin\AppData\Local\Temp\zapob.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5589afcdf046a6c05693d6221cb1d8e92
SHA1efe4c3b97e770255ccf600881bdc1a2dac5a1b1d
SHA2561f4e709fb783dfb83f58fb98bd7db82f27513a4e0d3c5088d051cc28ab0676cb
SHA512b19c9878ed0ae19f9d351946c7ff48fbf429bb0f869a4a1f35918ad61b3509b398b1c74d203f42f2b990768e4bec1746430ec8514d990d7f6393b011f694c49f
-
Filesize
512B
MD5b20b036f43e9ce4c38d1cefc5be1a500
SHA164b40481d540154e475fdcc74909031ab3bed072
SHA2563eb7924f213c72557400f6fd81641893c9af462da9718e1929900c837fd4bf0d
SHA5121576a2ebf737ede2ca7307d2988309e6669b41fe58e657e787c4864c6e1f31ce9803c266182379bd20f8d77d22ff8780ead0f339329400b26c2ffcb361df6de2
-
Filesize
326KB
MD534268cb6490a3db736cc0826fc85fa18
SHA1382e0357f36aded288e4ed247a479d0aaccdffce
SHA2566948b6aad384ba9d28d224d31916ffa2f4f1f0c046b9695fc33683bf8cdeb4fd
SHA512b3b790f2abd53225314ba9746b5ea5dc9358929f7eb382031d7042a34e720bb7017504644eefb4ca39d2f3f492fc4b68dc2bc8a456f9d38579b49e9690ca5f06
-
Filesize
172KB
MD5429bef1d1c3dcb02462040106cef2ae1
SHA16ccb5c7169f6c1be89db352c2470b8b9ff9db30b
SHA2561b98e23cfac518c0a8702ac7c84366efc1dc9b82ca83e8a8fc3ba19cde467d12
SHA5122cb122fe6f492e025a03517d4c3a88342b485760d5b63c45eaaf4de7dd5ec9203466d993c5efafa047954dea3bd2abe84aa4447b76d06d29de45f3fceaa7f2c3