Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 00:06
Behavioral task
behavioral1
Sample
89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe
Resource
win7-20240903-en
General
-
Target
89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe
-
Size
592KB
-
MD5
16acf12d33e939e05ff7d58ea575ed07
-
SHA1
1b8eab1affb80af01998ee11509c55191f8ca12b
-
SHA256
89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6
-
SHA512
5b1f0f6a875e3a961e2ae3bf287acbda92259ff781feab39f0a3e8891f648a960f121a6499aa042396e9203cf9ecc2ebbfea384f368a583efa25dcf53018aad0
-
SSDEEP
6144:CZKHKSIl0SatLPTUrjBpAs/mpYIqaaUN44Iq766ztAkOHn0LHZRP:C4jm0Sat7Az/gZvTIq2WKkw0FN
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation joybv.exe -
Executes dropped EXE 2 IoCs
pid Process 4204 joybv.exe 3096 tuizm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joybv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuizm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe 3096 tuizm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4204 3780 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe 88 PID 3780 wrote to memory of 4204 3780 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe 88 PID 3780 wrote to memory of 4204 3780 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe 88 PID 3780 wrote to memory of 2568 3780 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe 89 PID 3780 wrote to memory of 2568 3780 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe 89 PID 3780 wrote to memory of 2568 3780 89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe 89 PID 4204 wrote to memory of 3096 4204 joybv.exe 109 PID 4204 wrote to memory of 3096 4204 joybv.exe 109 PID 4204 wrote to memory of 3096 4204 joybv.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe"C:\Users\Admin\AppData\Local\Temp\89a801220bb3c7f05e0b18c6f0fbfc1e3bf6ae23e98fb103fe09360de6491ad6.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\joybv.exe"C:\Users\Admin\AppData\Local\Temp\joybv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\tuizm.exe"C:\Users\Admin\AppData\Local\Temp\tuizm.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD514cb2d56339f549aec3e7a9fac4f0eaf
SHA124c7ec553e4aa243be3047329cd58cb19188b0da
SHA2569de7171d88e19cb3214b389c926ced7fdea69b5056b80bbccb27f3835b7c70ed
SHA5128c858747dcf7a173e7165578e25255f6633f9096f095ad34c13344d9b85d7586c2b40664d5a30979ca10876f9abe590559cc601a1d1e6c8044eeab390bbdb766
-
Filesize
512B
MD5f655f8cf0334ce2f1431d45b1621c7c0
SHA1226504783867ff64ae98ca3541dabb3778ff83eb
SHA25648b61146fb0766e2994044a72e3bb548d9f18f0e5772fb7fb1339d6db609857a
SHA512ad3d2060ccedea303a36fb08a220e1abf2fec1345502556a3cc6b57cc00337089c0e1805a541414262ca09f25c03a906bdb7efc9c92b37a3c0dd049c097bf808
-
Filesize
592KB
MD5db5ab4266eb3a7cf549bce7dc11d0769
SHA1c3604f34f1c82c84ca6a7b2861fe3eb581ff1354
SHA2568e5a843ab93ef864079392d66c027dfd52781cc8c43cc9ff98c70cadd71850f8
SHA512a7734ac7e77b16592baac248f0124c5c1e89188b738e251b1788cf7e2f24562bb95f6b35302c5e0e43988647c7eaf602780536d21212eef56eeefc8d19e38634
-
Filesize
323KB
MD5bccf0aa75811be83b8a9506944274cbd
SHA1ec3da036b97e44c2f0fc2e5f551e76e79fd569ec
SHA2563ec05e5d664b688f0469597874e086976d90391fa5c87983713ec582a8af01d6
SHA512446e8a7da3ba207abd09b1e9eeb63eaae9ea4e51f800066de7c1c032bf067eb295d3ef3a612f6020cc067e41fbb9fbf51dcce2b38c0f9422f7a25baf1129b633