Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 21:45
Behavioral task
behavioral1
Sample
cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe
Resource
win7-20241010-en
General
-
Target
cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe
-
Size
555KB
-
MD5
49578e06b681e1ad56ca5fd417aef0fb
-
SHA1
e6cbb060c5ab504f2ec3f2cc2f621eaed907727d
-
SHA256
cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52
-
SHA512
75f26a3d205875d322337b5398b8627e77690d8c52f8db73e4391b846d0101f8a1fc4569d3d7ba0b209d7d8af1a2c730dc59f0f4f0115da1ed7460e879907471
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEyY:znPfQp9L3olqFY
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exequtef.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qutef.exe -
Executes dropped EXE 2 IoCs
Processes:
qutef.exemogoe.exepid process 4908 qutef.exe 3340 mogoe.exe -
Processes:
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\qutef.exe upx behavioral2/memory/4456-13-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/4908-16-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/4908-24-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exequtef.execmd.exemogoe.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qutef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mogoe.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
mogoe.exepid process 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe 3340 mogoe.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exequtef.exedescription pid process target process PID 4456 wrote to memory of 4908 4456 cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe qutef.exe PID 4456 wrote to memory of 4908 4456 cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe qutef.exe PID 4456 wrote to memory of 4908 4456 cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe qutef.exe PID 4456 wrote to memory of 1600 4456 cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe cmd.exe PID 4456 wrote to memory of 1600 4456 cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe cmd.exe PID 4456 wrote to memory of 1600 4456 cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe cmd.exe PID 4908 wrote to memory of 3340 4908 qutef.exe mogoe.exe PID 4908 wrote to memory of 3340 4908 qutef.exe mogoe.exe PID 4908 wrote to memory of 3340 4908 qutef.exe mogoe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe"C:\Users\Admin\AppData\Local\Temp\cf8c49870e8ada3b86dff073d82adcc302f9fafbf74bcf36e152dc087ff57b52.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\qutef.exe"C:\Users\Admin\AppData\Local\Temp\qutef.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\mogoe.exe"C:\Users\Admin\AppData\Local\Temp\mogoe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD516f866800d1bce0d461c4bf1d5cc826c
SHA1dbdd17e36e972d424cd619b2deca408138b4a533
SHA256f5422ceeba01071192926f939989bfd89156fcaa4cf7f586897de881ee34b1c8
SHA5125dd2deb742a6250871301e90321cac04eba0fbc8e009bd506712159646a00e327f97efc2c2c3461ca2d325e151e0af7a4f739f22613705eb889faeb8b5b7acfa
-
Filesize
512B
MD56f39ba8e707421eeb84ea4fe72e47c23
SHA1891421e27d9bbd1034320fb22798aad808f878f9
SHA256aea91ecc80e1c5d9a5c1596ace63ddb925bc57c84d0596905f080107414c0e7c
SHA512905bffe9b477941165dac5d44941059fc49578ddd855d558ed749f988a3b135b99b5df152c2fd38b21ba408c32939dab33114f16ef084944aeefca4059f14c91
-
Filesize
194KB
MD5ac2c559275692c462cba8dd76b3d3478
SHA17e4b8cd5049237eebf2b9fd493515c4eb4dbc0b8
SHA2561e17df1c9d9a39d03b602b540a997e770934cd0845f4f57ac9af57864891cce0
SHA512e69cef84e6ea8bbafc8c0af8e9da6bbdd9fc917c0c7605320ac4108dcfd172b6e4acfc4d65dc39af753f8336ac4409ae1728c6f43f85d87707e24b8e397e8429
-
Filesize
555KB
MD57f1030665a58635d2e33695ca60ea185
SHA1cf1c92cb52d7150b0372fd96e18ab92ec2d80c3a
SHA25600180378061edaf84c24d3a1545f8e3c1c593b4b2c605519f4408ac185d8cbe9
SHA512c2797beb4a882c481d99c2eeb8aedceaa8e7a31a262cd02cc59043ff1b62a00777f1c97e413182ac34a3aae54c770afbc529587afed0d117e42d8d58609bd46e