Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 16:08
Behavioral task
behavioral1
Sample
67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe
Resource
win7-20240903-en
General
-
Target
67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe
-
Size
448KB
-
MD5
eab7f8c8a9a42c5880fdbf3929e15a70
-
SHA1
516886d2b2b05c7774c4aff0480a44f17152c79e
-
SHA256
67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fb
-
SHA512
efc09439cfce232e71bc5e97586355fe59ccf9d0a4c5c9a9332c95830a08dec42c3d00d818e6a5c983c1456848638f052ce0e4aca289a9fde70caf9ace59efbd
-
SSDEEP
6144:CEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpdFb:CMpASIcWYx2U6hAJQn6
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exeqekoz.exeguemky.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qekoz.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation guemky.exe -
Executes dropped EXE 3 IoCs
Processes:
qekoz.exeguemky.execipoj.exepid process 2004 qekoz.exe 3024 guemky.exe 4336 cipoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exe67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exeqekoz.execmd.exeguemky.execipoj.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qekoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guemky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cipoj.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
cipoj.exepid process 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe 4336 cipoj.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exeqekoz.exeguemky.exedescription pid process target process PID 976 wrote to memory of 2004 976 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe qekoz.exe PID 976 wrote to memory of 2004 976 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe qekoz.exe PID 976 wrote to memory of 2004 976 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe qekoz.exe PID 976 wrote to memory of 772 976 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe cmd.exe PID 976 wrote to memory of 772 976 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe cmd.exe PID 976 wrote to memory of 772 976 67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe cmd.exe PID 2004 wrote to memory of 3024 2004 qekoz.exe guemky.exe PID 2004 wrote to memory of 3024 2004 qekoz.exe guemky.exe PID 2004 wrote to memory of 3024 2004 qekoz.exe guemky.exe PID 3024 wrote to memory of 4336 3024 guemky.exe cipoj.exe PID 3024 wrote to memory of 4336 3024 guemky.exe cipoj.exe PID 3024 wrote to memory of 4336 3024 guemky.exe cipoj.exe PID 3024 wrote to memory of 1156 3024 guemky.exe cmd.exe PID 3024 wrote to memory of 1156 3024 guemky.exe cmd.exe PID 3024 wrote to memory of 1156 3024 guemky.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe"C:\Users\Admin\AppData\Local\Temp\67980c2d0d647df48bdedc9637049e7f6da945bd574f66f22538923f99f067fbN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\qekoz.exe"C:\Users\Admin\AppData\Local\Temp\qekoz.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\guemky.exe"C:\Users\Admin\AppData\Local\Temp\guemky.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\cipoj.exe"C:\Users\Admin\AppData\Local\Temp\cipoj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5b7f65f804b7118f5213e2673b453bee6
SHA1958c5d30075b61e3fc7080c70500eaaa2e53d849
SHA256bda45a3c53ad32bf0c97b53d2c31e7f19b18a79108a509c1c3e13fc3282c0d2d
SHA5124f018f1a5ad0fe0303b0496f68aae2ab90d01a75427c07c997bc432985333b81b670275b5de7b754cf83829d9f9a000e6a7ca19c3930d84607e345c0947ced88
-
Filesize
342B
MD5db605b6f1d7aa265c278831a12ca09df
SHA1fac8b7476576df2c60dd8e1ee789e6dae4f48177
SHA2568bdf6d1ecdffb1e722a057ece13b2e619ddb4f84b4d087314338a93f209c3273
SHA51285068d322f1f6504c35ec4dcd1890c8ca81e9c1c543f1df9aab27bc0cc8610e2ced40a22cabc317d8fc1197ad15b3a8d8ef26cb3af5cd3753ea50f8453951c9f
-
Filesize
223KB
MD5653a0ebed95e8bd0ffc301d76440500f
SHA194c69ff0bb8e1de419b39a15ea9e4672ae9c163e
SHA25672417697bfc9a6ee89aac509f69dfcfde2efb922b12beac8118ede3332799aff
SHA5129df720fc3f6bd5178a5d4bcf5f034d3ef6c0266ff5b45c296541e671343390a9268885220588ff91607ecc2014fbe6647a19d0de07dd13397abcfa071a3dad03
-
Filesize
512B
MD5acc33e0b1f96007c20f78ee10d34350f
SHA122f7c2e32af1cadb25cc8a64186a605c12f4ff37
SHA256f72660fc57715804d319d98fc7c8828ac6d37a9dcece4ac80308ec1da424c26b
SHA512c3590a440a15d83e0a07e1e628e71ddcaf5d0ab3edbaf69883b18df5474861269bcf26f76563616f2cc39b75fb4cdeba77ecc46c9c3eedca3689bdd0e08f2d39
-
Filesize
448KB
MD57ebbaf1cc06e7e5323bbf121e47f37f4
SHA1d72d4c8318c499bfbc24e934a50ddd0ebaf7ae61
SHA2569722fa5dbe5db1e28131d48e82abdfedd9d1e07ff1d76ba605d948194ec77178
SHA51236991ac7527058a78ab321f64ec7735e34d324e19002e1a1543de1ffc0426bf1af5478b37f62943207c1b79f2821785f45a2e3c0347f01abd8ca8f3c2759e6e6
-
Filesize
448KB
MD53a4d31b23dafbeda458140cc4096cd18
SHA138a220ce4fb4a9c03f8a422b851caf713dc3460f
SHA2565aabda6fcc4eefc9165a063711c329de4ba5e4c4eb9e13878afefed957034bd0
SHA512f19e1b28cd6a14bf6b8b85b5bea605ee664834dfb59702b971119ad96f0ba9bdea910a941607e76400d916064b02b4f78c3a72931cf18b4eb6718524d6d2111f