Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe
Resource
win7-20240903-en
General
-
Target
c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe
-
Size
333KB
-
MD5
1451a4312a14a1ac2cfa72abc1c76b74
-
SHA1
e0a59172e30587cf9bbef9f917f8bb3735dbb901
-
SHA256
c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b
-
SHA512
2f1c8bb8b61241860dd820f43aa79f59ca700c08014d0be9dcc7a17b121e849fade8460a7d6b0cf1f8ee98b0f0efcd18226746995c8bd18d549bfa9b5c1387d3
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYX:vHW138/iXWlK885rKlGSekcj66cii
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exewocep.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wocep.exe -
Executes dropped EXE 2 IoCs
Processes:
wocep.exefyluy.exepid Process 4456 wocep.exe 4776 fyluy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exewocep.execmd.exefyluy.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wocep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyluy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fyluy.exepid Process 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe 4776 fyluy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exewocep.exedescription pid Process procid_target PID 3444 wrote to memory of 4456 3444 c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe 87 PID 3444 wrote to memory of 4456 3444 c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe 87 PID 3444 wrote to memory of 4456 3444 c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe 87 PID 3444 wrote to memory of 3688 3444 c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe 88 PID 3444 wrote to memory of 3688 3444 c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe 88 PID 3444 wrote to memory of 3688 3444 c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe 88 PID 4456 wrote to memory of 4776 4456 wocep.exe 109 PID 4456 wrote to memory of 4776 4456 wocep.exe 109 PID 4456 wrote to memory of 4776 4456 wocep.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe"C:\Users\Admin\AppData\Local\Temp\c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\wocep.exe"C:\Users\Admin\AppData\Local\Temp\wocep.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\fyluy.exe"C:\Users\Admin\AppData\Local\Temp\fyluy.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD57cd9f9bb0ccbb16c739aed2228374e01
SHA10cd8d6938dc888d475481ed6281a2219081cdc0b
SHA25651764318932983eb7cafc2c79850962dd0cd66f6cdd9ed8ac37e3ce424f9cd3e
SHA5122211757a4f94cb07943c94b644659cfedc7997f98ea12e45aa88f63be40b202cef43b14a9072c61cced53757dfce075e11d6d28fee57f5171c5ff8d48d1ff1ec
-
Filesize
172KB
MD50d27f3d7e23f041afb0dad4a09a68544
SHA1c103267572ffd81fad217ad38111de26f8897fe9
SHA256510b09451ca3c9ca0d5216217c276f9be9866036abed6eab254acf471c2d3655
SHA5129720ee43b2fd1db79596f955c998d66667cca046d7791f7faff6f5fd43b4cd7c8c70f3ac75fc5df8ca8b413f246377158307aa9fa7df8d3f406f9a04cabb4ed1
-
Filesize
512B
MD5ed207ee81e8c3eb726504f8411211ed4
SHA11a30bcaee546cbc9313020a4593a57ca941bde64
SHA256132fdcadc41fa74e734efe23c1749c900749f430d69914aa8809f431ead31daf
SHA5120d9f2186a6713775146df07f61e9cc0487162c90f48c12b6f6993114befebcca299fd4d7d509547776ebcd46af95ca0e9b48cc4cb9ad32f0496082b80a4715c9
-
Filesize
333KB
MD5952c7ec3e4100a1c57d953139838ed98
SHA11f62e03bb6b203420a30595d13bbd93206654480
SHA256b447f00d5b1a51613f8f8cac76a34c50b709ccc7ac5ba9ebfcbee1dce0418d3e
SHA5129a8427807bb74a174be9c74669c59451fbea2439b6204ff57ae36dfe6cfdcceb3067fd20bebbe3c21cb8c67b6cfd29ec7ab8aea3b6caa5c05454188d0e8f9575