Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 09:59
Behavioral task
behavioral1
Sample
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe
Resource
win7-20240903-en
General
-
Target
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe
-
Size
331KB
-
MD5
a19061efa0ec169b8185848b9cd64970
-
SHA1
a66e713f8e8a839ea26521c0bd919f3bcd3b9c34
-
SHA256
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9
-
SHA512
dca58cabf92c1eb225c87a7f377aae5a52cc081779567a5d042c2c174a3bc15d520df8e45afd5f5d051437dbb3a59e4a2a4b4f82f5c8154b0470687804883b8d
-
SSDEEP
3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZisn:Nd7rpL43btmQ58Z27zw39gY2FeZh4A
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Processes:
resource yara_rule behavioral2/files/0x0002000000021f52-31.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
koxazi.exeb4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exedyawv.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation koxazi.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation dyawv.exe -
Executes dropped EXE 3 IoCs
Processes:
dyawv.exekoxazi.execihor.exepid Process 1228 dyawv.exe 2328 koxazi.exe 4152 cihor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exedyawv.execmd.exekoxazi.execihor.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyawv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koxazi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cihor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
cihor.exepid Process 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe 4152 cihor.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exedyawv.exekoxazi.exedescription pid Process procid_target PID 4972 wrote to memory of 1228 4972 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 85 PID 4972 wrote to memory of 1228 4972 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 85 PID 4972 wrote to memory of 1228 4972 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 85 PID 4972 wrote to memory of 2624 4972 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 86 PID 4972 wrote to memory of 2624 4972 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 86 PID 4972 wrote to memory of 2624 4972 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 86 PID 1228 wrote to memory of 2328 1228 dyawv.exe 88 PID 1228 wrote to memory of 2328 1228 dyawv.exe 88 PID 1228 wrote to memory of 2328 1228 dyawv.exe 88 PID 2328 wrote to memory of 4152 2328 koxazi.exe 99 PID 2328 wrote to memory of 4152 2328 koxazi.exe 99 PID 2328 wrote to memory of 4152 2328 koxazi.exe 99 PID 2328 wrote to memory of 4292 2328 koxazi.exe 100 PID 2328 wrote to memory of 4292 2328 koxazi.exe 100 PID 2328 wrote to memory of 4292 2328 koxazi.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe"C:\Users\Admin\AppData\Local\Temp\b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\dyawv.exe"C:\Users\Admin\AppData\Local\Temp\dyawv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\koxazi.exe"C:\Users\Admin\AppData\Local\Temp\koxazi.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\cihor.exe"C:\Users\Admin\AppData\Local\Temp\cihor.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4292
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD55e89e6d675c60a47ed8e6a7e0a424109
SHA14bfa84c0181591fb336eaea476094a9e385abb17
SHA25633396f80da0f4e3789ef789a5ea42c7d1db0554140c9a2881aca5f0abff707c1
SHA512f406c55180a85b96498cd746ecfefa94fb50bc96cdc17492e5bd5356da6ce1cbac2b164890092929e36939cce37533b7e2072711acf913ada48d7311e650776e
-
Filesize
224B
MD54097b979b5512c8fdd8b096745e22999
SHA147a22c99366ca85dfe3692cf819c376c4028e297
SHA25698138d4b1a6a35308899d9245b59f5babd9d2ca6cccfd453a32d5a10156276f8
SHA51233eb3891e8034c8a00b2aaeb0caf32f4cc204abd89f1998d1f1dc2bd26b0050413220bb3f94b00db1062a412a2a57c10e1fe666a4af307c420d9c6f65bd75338
-
Filesize
136KB
MD500ef217cc7583245bdc2f85a921f55ff
SHA141d9b45537aad032b66ec9cebc43f60a3e68e5bc
SHA25630179ad40a8b1b4363db78632b357244fb0ad95a161692300f1edb2ac9f8db70
SHA51288962a0bb683018bef8f8b44c957b326264f33d62fb69c025f4f78418da6cad0b86426a634b6e6a0afbeb0e057db2a76b86f303876ecff8cdd327c8ccb4f9065
-
Filesize
331KB
MD5fcc104be554a9b8d7f226156a285539e
SHA10a01cfbc7eed64cd92d07fbffec95fc9c881850c
SHA2569c25ff4e01a0a2e005952c51e4bde98d4fa2b42a4b517d882ac30e455190ca69
SHA5121eccf900a504e5accd889855b98fa6c376c5be8f46e959e09781d940e79068aa60370877719f7626221b5a597c70b320f6ab55ca52e158a019648fcc3d295917
-
Filesize
512B
MD5aa87927a75c3b6f098a2ffb283ecbc56
SHA120dca9d6ba7fc0b7361110816eff536125f5b799
SHA256bdbc547723fa2377809526fcd71673f8ff909c7b1ddac8c07482b9cca7c5df9a
SHA512218c0e39d51418da460ac70ab059dff5ef15e14e50c399fb6c4d572cf996ef3b2b02991552b184ba0574ae25e40382aee63297dd07d0a5229ddc8b6cd31b9a0d