Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 00:37
Behavioral task
behavioral1
Sample
bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe
Resource
win7-20241023-en
General
-
Target
bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe
-
Size
411KB
-
MD5
aa97dcb39873e4a80aa2063724ee96b0
-
SHA1
bb5475dd2c5554a9afbdc14256fafbbec8fb0bda
-
SHA256
bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5a
-
SHA512
d9735c5123c29b148f3c47ef94b854c29649e16516d5593f5ebf1f29d1b9a0062ba5dbef6e008e1b7ba1db7e1d0c0dcb5ef60ec6ac7f3873efd9175c915288ad
-
SSDEEP
6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOC3l10:oU7M5ijWh0XOW4sEfeOWK
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\cuseq.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exegafap.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation gafap.exe -
Executes dropped EXE 2 IoCs
Processes:
gafap.execuseq.exepid process 2592 gafap.exe 3936 cuseq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execuseq.exebfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exegafap.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuseq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gafap.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
cuseq.exepid process 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe 3936 cuseq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exegafap.exedescription pid process target process PID 3252 wrote to memory of 2592 3252 bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe gafap.exe PID 3252 wrote to memory of 2592 3252 bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe gafap.exe PID 3252 wrote to memory of 2592 3252 bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe gafap.exe PID 3252 wrote to memory of 2276 3252 bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe cmd.exe PID 3252 wrote to memory of 2276 3252 bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe cmd.exe PID 3252 wrote to memory of 2276 3252 bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe cmd.exe PID 2592 wrote to memory of 3936 2592 gafap.exe cuseq.exe PID 2592 wrote to memory of 3936 2592 gafap.exe cuseq.exe PID 2592 wrote to memory of 3936 2592 gafap.exe cuseq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe"C:\Users\Admin\AppData\Local\Temp\bfc08bf1b6de34087a1c8e7e80ac574755734dbc2ebc540f94be23355c8f6c5aN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\gafap.exe"C:\Users\Admin\AppData\Local\Temp\gafap.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\cuseq.exe"C:\Users\Admin\AppData\Local\Temp\cuseq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5919ee717ce10c9512526d943d900af50
SHA11a8a93e78aaefb771106b590015451584cda802e
SHA256ea905a861aba1abd52fa411ba61d3a319bd3be808132e94cb1c06f14c4ba7153
SHA5127459119293859470f7f05fe200cacd584e54c7aed6d2a25dddad9369fd877e1432a11ad22254bf9d8b5a7bc2cb38973b1e6c96785c1498a547d927354f28cd98
-
Filesize
212KB
MD52bf703903a8ea35121ba65ee70d8b00f
SHA139642498fe6e1ec6e8d9337b94eb3e758a42dc9a
SHA256d8c6039745f7251f3a051f0fbc112000950cd1236fbf12cfbdb03da688af5302
SHA512019411a5ee8eb872af47245e822e0374f543a815888b65e0a5e466f2a473eeff1c528d24e889ecc57960193fa62f19febe35a9f68c566a26008e6af0972006a6
-
Filesize
411KB
MD543b980ff108000a9eba8a23144985f4e
SHA1df0c22473b1c2f023abd641f20f5263cc664a54d
SHA2568a3f6470e0eedf41f90688fa26925e7ea0f2b2f945a016c742a06ece4a566771
SHA51211dc5644be09cda7fc649d403327157a984eb6aad6092c6f52e3c26349697a79346891cafef6f47648924d52c2f0761f085bde9a69aafd5e4fd73158e8e8186d
-
Filesize
512B
MD52337e1a17964bbd8dd5413ba6e3ee1b2
SHA1f779d24fc945a2091afbf36cfc8fdc3f0e345c21
SHA2560728718d8b664366731ac283b45c44d7862458559756028c8df147b1dbbaf083
SHA512423b8e22f0c299dc4a27054999018e8056fb9345cc591c6a99e3db5daa7062f8ac66129ef7c6b13096d47c2aee3a23ebab71dc44e06576a38ff2c239f2cfc229