Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe
Resource
win7-20240903-en
General
-
Target
60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe
-
Size
327KB
-
MD5
211974cb67a1ada8a164b7bd3529b0fc
-
SHA1
c2ce238eb3905d86339cc05ba995c28ee027de87
-
SHA256
60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae
-
SHA512
ad75fb7d6d998dd0b535c02e3067e0e21289a7c8e328c27d8329e2c31e3fc8739a8a27ee0e9cc2139da9a1d1115c668de77fcfff5f6988084f503fb7187b0271
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYn:vHW138/iXWlK885rKlGSekcj66ciu
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation azxof.exe -
Executes dropped EXE 2 IoCs
pid Process 4688 azxof.exe 3012 uxysa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxysa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azxof.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe 3012 uxysa.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4688 2872 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe 88 PID 2872 wrote to memory of 4688 2872 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe 88 PID 2872 wrote to memory of 4688 2872 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe 88 PID 2872 wrote to memory of 2620 2872 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe 89 PID 2872 wrote to memory of 2620 2872 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe 89 PID 2872 wrote to memory of 2620 2872 60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe 89 PID 4688 wrote to memory of 3012 4688 azxof.exe 108 PID 4688 wrote to memory of 3012 4688 azxof.exe 108 PID 4688 wrote to memory of 3012 4688 azxof.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe"C:\Users\Admin\AppData\Local\Temp\60cb8f57ba0f009a441e09db7f876af018d6eb7ebded61d09799fe7fc71585ae.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\azxof.exe"C:\Users\Admin\AppData\Local\Temp\azxof.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\uxysa.exe"C:\Users\Admin\AppData\Local\Temp\uxysa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d25a635a53142e2971e71acce13bcaa9
SHA122728a460175607a8f611ba21e6fe7501177ef3e
SHA256d528732a39e62f4d98641fea8b15ae32a49dfcee78fbcfeea6d872ca07d7cfc5
SHA5127c26ad1f319559c1c261eb808aa1faf1a103b4a02b21595ba311380c5d2f3ce12e3c3a1499e7d6fe36bebd0573eec3897f8faa1d52191475ed6604fd30c1d5b0
-
Filesize
327KB
MD5f3d02e21220efd2e0a246026e249f4fe
SHA1ff6da3a82de6e56cae5b5a375d6a08454b4d2cd2
SHA256316e8ba2b848d3bc89bc7c4d286932ad725645052707c5e88f08d55d988cfb38
SHA512e8901a9f5aae93196096e74938d2fb6d1d104b0190801ed120451658977873fadb8139d36e142f821c8dbce52b62feac7e8a6ea4d33f19e615dae0b4734ac7bc
-
Filesize
512B
MD5eaa0a4849902c1d9dd9edb5fff867a61
SHA16c3039fc5e6d1f46a8a108d2b1339672efd76be3
SHA2560fb6061fac6d67d838804540d7e76fe7f6443b1046a68fe035b8028e750e7495
SHA5122446c5b88722f20529f5f69c331cce0577208a6c1f4e04d06aa8e33837495dbb148c316e5e2dc184f58a1aff6b6616e300fba6ad92ade8b79ae26eb80e6792f0
-
Filesize
172KB
MD5117e20e3bdb3cda1fedbf0c372df47d7
SHA17253acb48d4e673b79bf07f94ac91a6eb24871ae
SHA25627b46b398c244776dc19c4057ad3624b5cdf78f88df19ae5d2c0195b27be692f
SHA5126f88d3513e56406a05bcef63314846a4c23958650e17fc3c49a8097b626bd11a7b0c9c155b14de878d2a4a931ce811c7090541694d8420111cbc4609450b8849