Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe
Resource
win7-20241010-en
General
-
Target
e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe
-
Size
334KB
-
MD5
3234cf4c81bfcee023e8b2f5a4912775
-
SHA1
3fb4ee1ba10cd6670b2c301c376d59ee634a8259
-
SHA256
e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9
-
SHA512
e8a8651bf6f2a34d9b3cf1471cf417704e40cda4d61a14e21eeb441f0a0ebe5a8553c96e1265e76ffc87b8365f210f1d91a1c96dbe020a6aff06cb9271cb581e
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYl:vHW138/iXWlK885rKlGSekcj66ci8
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exeagjii.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation agjii.exe -
Executes dropped EXE 2 IoCs
Processes:
agjii.exevebyr.exepid process 4136 agjii.exe 316 vebyr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exeagjii.execmd.exevebyr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agjii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vebyr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
vebyr.exepid process 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe 316 vebyr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exeagjii.exedescription pid process target process PID 5104 wrote to memory of 4136 5104 e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe agjii.exe PID 5104 wrote to memory of 4136 5104 e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe agjii.exe PID 5104 wrote to memory of 4136 5104 e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe agjii.exe PID 5104 wrote to memory of 4408 5104 e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe cmd.exe PID 5104 wrote to memory of 4408 5104 e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe cmd.exe PID 5104 wrote to memory of 4408 5104 e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe cmd.exe PID 4136 wrote to memory of 316 4136 agjii.exe vebyr.exe PID 4136 wrote to memory of 316 4136 agjii.exe vebyr.exe PID 4136 wrote to memory of 316 4136 agjii.exe vebyr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe"C:\Users\Admin\AppData\Local\Temp\e49f2e9313e5d29d6b76640a50272a9ac7da9d573db26849954ad91fee0324a9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\agjii.exe"C:\Users\Admin\AppData\Local\Temp\agjii.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\vebyr.exe"C:\Users\Admin\AppData\Local\Temp\vebyr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD52499982d596b1d61beff3ab3af9566a2
SHA13ebde4128cbdfbfbfc31997c237b4ed443460477
SHA256c297fd57b2ccd31d8489db15fd9dbc22e09976fd0ae254aba0d0b1d381e1e2b9
SHA5120d0ff75cd0cefff027dc06c97919d2951813929ae35573659be335ec8cfa52473fcf384d2d3e53e7f76c5f895aaeb28c95555913631f3775ba3e996822d2f4c5
-
Filesize
334KB
MD5fc04f79c5148cfe10b5fd81aec36ce11
SHA1d8936c5977169ce3ef35ad8c935a6155492fb4cc
SHA2565a2a8f6595ecc1d8980b0b8bd1fc774631daf4bff1da697f573f7dfea8c94eb6
SHA51266e778219ad7dd88b66bd98ce78ca57288fd4dc8d6b6508635b50d4fb7da50724e2ea9555de50fd132269341432caec562d0e5ebebec2b0fb9e1054783cff7e5
-
Filesize
512B
MD523c5556d3f5c66e668a12297ce688eac
SHA1e384ac6768d2aa81d83c15e586be15f8da7e183a
SHA256a25ee5a371c59eb9be5a143158249d50844e4565eb9cd252834c12187610f1ce
SHA512b053029f207760b869499f0aa3a69aa8b9a45023347810ad8e39fdb2773265cea9ea45123f75e0e14767767f0f78ec2c9e4fdfe347a55fcb4a5e991850b70a33
-
Filesize
172KB
MD5887e21f696957367a5f4d1e0ce183475
SHA18664af3d1dde7da4dd92dcecb78e706ef709968e
SHA256318f4e77b98c9f35e9335e7803d48c78762c9360f5eaf1827039ed155df44af7
SHA51256b78b4484f9541c9e8cf82e5bafdd2f5f53e81ed7312b79d7086fcaa4c1d22d28081764105f84226af99c8e494c742a0f8cbc11c02bb786c89ea57eaa7aed2a