Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 20:48
Behavioral task
behavioral1
Sample
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe
Resource
win7-20240903-en
General
-
Target
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe
-
Size
660KB
-
MD5
fa22a94cf15e0f978ab5f354af7b28c0
-
SHA1
75997c17a503e2a2f48f5d81a7f561a7d90fe7c9
-
SHA256
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074f
-
SHA512
0a8f9f498babb7ac26455b8e8c0d9e286b7977c35e436de6ebbf0bdc9318f576f432ab404a59e11dd6b1629baaed0fcd46811da27706ab51d73016f8afb907cd
-
SSDEEP
6144:O1xBWeMRygxDLbHxlSBxzJn1REBB6q1gBFJV6AvRqsf6YU+FM+3Yn/fCXjQGDqLO:Ol3MQIDKJzTq+Xxvo0U+d3s/fCX0Y
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exemecoj.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation mecoj.exe -
Executes dropped EXE 2 IoCs
Processes:
mecoj.exeusvik.exepid Process 3640 mecoj.exe 4576 usvik.exe -
Processes:
resource yara_rule behavioral2/memory/4476-0-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/files/0x0002000000022dcd-6.dat upx behavioral2/memory/3640-12-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/4476-14-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/3640-17-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/files/0x0002000000021f51-22.dat upx behavioral2/memory/4576-26-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/3640-27-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/4576-28-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-29-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-30-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-31-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-32-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-33-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-34-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-35-0x00000000005D0000-0x000000000068A000-memory.dmp upx behavioral2/memory/4576-36-0x00000000005D0000-0x000000000068A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exemecoj.execmd.exeusvik.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mecoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usvik.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exemecoj.exeusvik.exepid Process 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 3640 mecoj.exe 3640 mecoj.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe 4576 usvik.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exemecoj.exedescription pid Process procid_target PID 4476 wrote to memory of 3640 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 89 PID 4476 wrote to memory of 3640 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 89 PID 4476 wrote to memory of 3640 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 89 PID 4476 wrote to memory of 4972 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 90 PID 4476 wrote to memory of 4972 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 90 PID 4476 wrote to memory of 4972 4476 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 90 PID 3640 wrote to memory of 4576 3640 mecoj.exe 98 PID 3640 wrote to memory of 4576 3640 mecoj.exe 98 PID 3640 wrote to memory of 4576 3640 mecoj.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe"C:\Users\Admin\AppData\Local\Temp\7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\mecoj.exe"C:\Users\Admin\AppData\Local\Temp\mecoj.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\usvik.exe"C:\Users\Admin\AppData\Local\Temp\usvik.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343B
MD5f46847abee1e922e6e3891fed2523c49
SHA192e963e39c22d1e9025dd4e083605fe7656a9a05
SHA256a5e75557e8eb4c098e7100d141c75186dc3be071245f2eaed23b17e7b8c72d30
SHA512c4acd3e822197402611464b7a4cdece51716c1805e2f291701a0028553c472b2f30400b11b998497253ebc13ada4c9991d40e50f69f6674c8d2f30d0f207313e
-
Filesize
512B
MD537c21a1cb456dc19bbcb7cada80bb364
SHA18d6a2040a7717e87d576a880c532476d75b344d7
SHA25693a86eab5a1f717168738934b6d20aed8fb065f97302d22b60929b6586eae011
SHA512b932697b8a4e86e51a91f62b4a6c7cdd3dc9ded754fe557b2b65b5178de3e5b22fc7874ea69dc2ed0fd81fcc29e1a8e1dc39402d53c4b1d5238eb4020e027d87
-
Filesize
660KB
MD532329964b4c05c9fcfd71bf8c268b88c
SHA190f384cf3143fc41f05b457bb213364dc7319512
SHA2566d05fc40980982b98dc84c5d1b6bc0163df7dff8ff5dcb98def4a22a3b507015
SHA512e5b1fc226ba66b900db3402659a7b2e85e7967954a1c829e4eadbac524d223e6ec04a4cd99dc2759c5463fd996693fee3d2701ca853a7a8118048ec467eb1818
-
Filesize
243KB
MD5fb0f461da17c2f23109a2ace2bd8ca76
SHA18e0b6fcd15f5a3f16361127847d21e692fba0d5e
SHA2560b2570c193fb29329d9c403e31bfacf71c380012ed34ce9eed9826c9231176f8
SHA512a49a5ed98b072f92d37e91f72208abbeb5a1b0bb5b972d3c447da58b6309243b6a23669beba19226257180bc4dc339d68e1532d7f4897b58964f9d10fda397ee