Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe
Resource
win7-20240903-en
General
-
Target
52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe
-
Size
332KB
-
MD5
277aade9d81f39ce3777ed79d5ab10c5
-
SHA1
fda2240f20e5330f62fce7998aab8d6410375a10
-
SHA256
52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924
-
SHA512
33053db3052de5a88c24bec07445f6152964f02b7aec97f9515717e64ea8e1f444bac71ef71a5bc00d77ca29b951f855a0b73c1e71007f4ef8e4e141dfe01694
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVVB:vHW138/iXWlK885rKlGSekcj66ciEVB
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation nugyq.exe -
Executes dropped EXE 2 IoCs
pid Process 3476 nugyq.exe 2452 pezyo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pezyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nugyq.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe 2452 pezyo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3476 2912 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe 87 PID 2912 wrote to memory of 3476 2912 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe 87 PID 2912 wrote to memory of 3476 2912 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe 87 PID 2912 wrote to memory of 708 2912 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe 88 PID 2912 wrote to memory of 708 2912 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe 88 PID 2912 wrote to memory of 708 2912 52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe 88 PID 3476 wrote to memory of 2452 3476 nugyq.exe 107 PID 3476 wrote to memory of 2452 3476 nugyq.exe 107 PID 3476 wrote to memory of 2452 3476 nugyq.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe"C:\Users\Admin\AppData\Local\Temp\52fe8a677c8c2ac2b8978628929e0be6e87f430d16f4e48c75033af005f92924.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\nugyq.exe"C:\Users\Admin\AppData\Local\Temp\nugyq.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\pezyo.exe"C:\Users\Admin\AppData\Local\Temp\pezyo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD52ab15d5cc5f585cb6ad64ce0d483f6b3
SHA15d1c13465ffa45cea4995cff18b5e4c97a1e94d6
SHA2565927e7573fae77e1aa2880741531bfff9aec813423cf01a7e62101bb328a4aa1
SHA5124cf361e7c48b644d8cd4849627ad0e154355a036daf7b8ad3abc4e586823f913868e65de37a1a4232b1f7b486ecdb44d11f0b9b804af58d44a4668d025bb4f5f
-
Filesize
512B
MD5b258aee56fae575f8c953aa3a131f075
SHA12dd1baefb3231f460f7cbaafc78eb0a563e4726a
SHA256efae184cb25e80e3144d6c7b708b0d6568b053ac9db0bacb79b8be2e01adc474
SHA512c1987885be69954e2825b33478bc773afa1365ee811688deb3ab2a186175109f679760307ce6e844c7fad70ea8a3f652e321f2c8388ccf7957ca348f78248096
-
Filesize
332KB
MD5cb27cb5978ae64c4f60f9c0d71ce2782
SHA167df2bac1ee84fa8a248735b3031b4d7a4a0c15e
SHA256ead9a312699d9b3399ab2115531a0e5e594e6d17e3954899852b24a17c462a03
SHA512ac3753660e25dd4b64fc01d1a253b900b5391808a7c260de3ace71b1d0d5bf367fe022bd6baab209f5bc271dc8f8bd50853bd1e77864067c9c01268c2776c462
-
Filesize
172KB
MD53b10ccaef5c2fd06feace3e0cf1bb6f9
SHA1c4b4d8df6099178b4dd2603b02c5c0792b19f7ab
SHA256da13ea68e507ae4c15f8ac8427f75744c305f159e7309676788aa1838c359c52
SHA5121c66e76f3dc630524d38b0fecaf85e2d48422ccb67ec208ab7057d38bcb05e7ce1c0170c047ebb838120d8b07ad5c63f77226b56411c70268e328f13b330939b