Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe
Resource
win7-20240903-en
General
-
Target
2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe
-
Size
334KB
-
MD5
56ab5b6ddbcd5b119c7ad028db7df480
-
SHA1
ee8b233b1f7a6cc3cb4b8d06dad01f8ff1a90822
-
SHA256
2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851e
-
SHA512
d63d76b5cfe18645213025cff3515827712403808779880758b539fc981450786aa3a3392009e9b8b641a8fa8ba70a03f70f0714f68b4960ba158f0afa326f25
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYw6:vHW138/iXWlK885rKlGSekcj66ciV6
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exebukot.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation bukot.exe -
Executes dropped EXE 2 IoCs
Processes:
bukot.execusuc.exepid process 4228 bukot.exe 3592 cusuc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bukot.execmd.execusuc.exe2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bukot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cusuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
cusuc.exepid process 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe 3592 cusuc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exebukot.exedescription pid process target process PID 1604 wrote to memory of 4228 1604 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe bukot.exe PID 1604 wrote to memory of 4228 1604 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe bukot.exe PID 1604 wrote to memory of 4228 1604 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe bukot.exe PID 1604 wrote to memory of 3988 1604 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe cmd.exe PID 1604 wrote to memory of 3988 1604 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe cmd.exe PID 1604 wrote to memory of 3988 1604 2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe cmd.exe PID 4228 wrote to memory of 3592 4228 bukot.exe cusuc.exe PID 4228 wrote to memory of 3592 4228 bukot.exe cusuc.exe PID 4228 wrote to memory of 3592 4228 bukot.exe cusuc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe"C:\Users\Admin\AppData\Local\Temp\2cb3923b42874722c2a3275f0153e973dee3c15b72f51945482a49c1bc9d851eN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\bukot.exe"C:\Users\Admin\AppData\Local\Temp\bukot.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\cusuc.exe"C:\Users\Admin\AppData\Local\Temp\cusuc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5b166fc0e40859275e71e238917ddc375
SHA14c3de091a0e6fee9e2eff052568ab606c7cf8909
SHA256a60cf0d9ee4e78840c9751dbd43228557d0fa9aad9b012a780b2bcdcccbbf25f
SHA51227b05706dcebeae451cae77a7f2adfb968a1d79861eec31bb76f6d3b060c977ac59ec931cf928e408680bdffcb336dbd2ecf7eed9f70dc3f6af0b112562b1037
-
Filesize
334KB
MD5366503042b84445cf24416a0f1c7bf6f
SHA10b28f63d2fd86c9f7f0b7be8e2e8fc51bb87880e
SHA2561f135bbb92fb2354e8bde31ccdba0b70df449f3462a5ae462c1be4ee039bdd51
SHA512494fc6ff201d13e4c1a512a6b44b8fa9ff7d435708fdd23c9c4effedc9918b97a16e443f7d73777b2ae395fda83e95e10cc7649fae0c14bf698dd3324c48f67e
-
Filesize
172KB
MD56413e28523d2a1159c1145280417b997
SHA1026cfbcfbafdbd23b763c451aabed0ae90f00edc
SHA256ed9bdcbf2c3a2a8ba3c0e993bbc0523c9f159ff1c81bce66074152073e803482
SHA512c40e5c4aa4c1d725e863ee847d519fa43a206d98c906fb20f852f29e378915ba3a4ac4e74c2a9c0e47c0895e8b26754d46916f27824bc035844bb7525c9c1d66
-
Filesize
512B
MD5d826ff35d70635db65af3a7fb676346a
SHA1f6fe063a7de627e4bfbd43d8a760f65994916ba5
SHA2560fff295e75d64b1e33e92dfc60987b6f7fcc2925ec2c865875453d79fec22378
SHA5120ea3e4b4e3a0f2807564243ba3dc896dbc3c8a05cfa4171d1f59553d31df218ecd166ac1888abe5c7b03cfc22c4f320bda60eb2cbe4dbab097fb684e3ac5eebd