Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe
Resource
win7-20240903-en
General
-
Target
b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe
-
Size
333KB
-
MD5
7c52fa1dc9e1c5e59b28723dfab0a5b6
-
SHA1
90838f4318a86b255e60c6d6d44faabcf7a3e254
-
SHA256
b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341
-
SHA512
52110668c323a0e6fb653f7aa17c28ad5fa4f30bf6cba9e582f89b1ad4004b8596d4bc534b52c3f31b530298878caf01342c5979ea4edcb5f8d96b5a98805d52
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYiU:vHW138/iXWlK885rKlGSekcj66ci/U
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
noajf.exeb9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation noajf.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe -
Executes dropped EXE 2 IoCs
Processes:
noajf.exerizyz.exepid process 2984 noajf.exe 3512 rizyz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rizyz.exeb9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exenoajf.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rizyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noajf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rizyz.exepid process 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe 3512 rizyz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exenoajf.exedescription pid process target process PID 5044 wrote to memory of 2984 5044 b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe noajf.exe PID 5044 wrote to memory of 2984 5044 b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe noajf.exe PID 5044 wrote to memory of 2984 5044 b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe noajf.exe PID 5044 wrote to memory of 3588 5044 b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe cmd.exe PID 5044 wrote to memory of 3588 5044 b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe cmd.exe PID 5044 wrote to memory of 3588 5044 b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe cmd.exe PID 2984 wrote to memory of 3512 2984 noajf.exe rizyz.exe PID 2984 wrote to memory of 3512 2984 noajf.exe rizyz.exe PID 2984 wrote to memory of 3512 2984 noajf.exe rizyz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe"C:\Users\Admin\AppData\Local\Temp\b9a4ef2e93da2c76fdf66f0054078c993adb4aba091449213f95920f7760d341.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\noajf.exe"C:\Users\Admin\AppData\Local\Temp\noajf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\rizyz.exe"C:\Users\Admin\AppData\Local\Temp\rizyz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5a54630d7c21fb442b07d11534ffc4e22
SHA11f18054b31dc4f877ae5bb5ffe13a818db9f02bf
SHA256761dccdc20e1864808dbe66b5dd552bcbf0232270955c82a25af07f2720eb5a6
SHA5121002d310e6f02b9275b1a4d77d90cb50682c96716d999c7dac564310fa8134cf785a5102ca2093d3d1c595b1e0d94f55468b04a33289cabb2a9a12c98c222305
-
Filesize
512B
MD58eb35579252476d3fa7ec1ca604b97c0
SHA116bff87b266c53dcce982f1af1c1874949fb4ecd
SHA2563035470044ca6569b416517a5e5daec5e2bc3dd4c0b12947eea28f7ff7214884
SHA512791631d9a92cf598c2182dba6186ca45a202391e093a593fc42244cab90d136ad80b1da69bd7abc331fa23bcfc42c3f7e7d9948ab01bbb85adcd262c643a6a6d
-
Filesize
333KB
MD5a8116c3c749f75df43d8b7817a584791
SHA1ee57de62449bbf02239a1170b9075730390c9730
SHA256d8ab6666af4ece7eaa4ec793a2cad0f1876e24297e9e1a7d17509792d3295f54
SHA5121cbb98ff6327eb502960670cf73c13c6022a9c817f2093fdd0af03287e6ca72c2ee93af327115651e5fa59657d23687d94c45c2de5f9e62a459534826e624861
-
Filesize
172KB
MD53bbd8a67cf4e29414785b47792b95476
SHA1c910609037674008739b83356c24960818e793db
SHA2567124ef2af7c8af5ef974db90bb7e703bcaec6d6e62923a15844df2f4c38b0fad
SHA51274e876d5de0453c78c794d650770f7448ce8b58d181df9b58f187119cc13ce8976c49879f624936ff93feccd1709162258fcf403719536c8b37206235ba7f202