Analysis
-
max time kernel
119s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe
Resource
win7-20241010-en
General
-
Target
f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe
-
Size
332KB
-
MD5
8ec941fc6702f584dded6bd4ea2d0730
-
SHA1
b4f114f72de169ac51740d47cf254db76991974f
-
SHA256
f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0a
-
SHA512
a5733e07fcddb2f652ace08c6924406bd076681753d180b947ecd01e4d1d78b616e09789aa8d550c5278987716fa5d4adf6350804ed36b4ea1a7d71344c70ba2
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVVD:vHW138/iXWlK885rKlGSekcj66ciEVD
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation koorm.exe -
Executes dropped EXE 2 IoCs
pid Process 3528 koorm.exe 4972 qyape.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koorm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qyape.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe 4972 qyape.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3528 4100 f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe 86 PID 4100 wrote to memory of 3528 4100 f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe 86 PID 4100 wrote to memory of 3528 4100 f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe 86 PID 4100 wrote to memory of 2400 4100 f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe 87 PID 4100 wrote to memory of 2400 4100 f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe 87 PID 4100 wrote to memory of 2400 4100 f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe 87 PID 3528 wrote to memory of 4972 3528 koorm.exe 106 PID 3528 wrote to memory of 4972 3528 koorm.exe 106 PID 3528 wrote to memory of 4972 3528 koorm.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe"C:\Users\Admin\AppData\Local\Temp\f7beae4526286a3a56e62e69d512a27c8acb1f2300052fc4f235f7f128ce0d0aN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\koorm.exe"C:\Users\Admin\AppData\Local\Temp\koorm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\qyape.exe"C:\Users\Admin\AppData\Local\Temp\qyape.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD52afb6d789377100540acb4d4006cd188
SHA173a8e08e2d6b2b1ddf2388cfa5173e68a8802e11
SHA256a4edb0fa1ffa588d67214b678c83cd2619db3de127f189f5b35f8be562d2b559
SHA51238a14c23b83c138cc7129f831119fd8181726ebb5714e0fae349e9ace7722c84e56353c4ce4bd139fbc357647685aaaa55781b0d2a703858aaaaf416f4e2e9f8
-
Filesize
512B
MD5b9cd238d9001693ee63850a8affa4cd7
SHA1354aaa4ad483e038b739794fc72e12c3c2817b46
SHA2566f9bb538fb48ca7ad0e5635817dd8855dfcf51ba352b266ba64bf471646a8e40
SHA512352c34c67016c7992400f4315650fdab90c119bb26e1f5b8acc2e29ed0154485c69188409033a9a927e05b24715a73c88bb5b960f2cbb54baeb92a3623a77656
-
Filesize
332KB
MD539ad9afa903c412e1efa21a8268a0acb
SHA1e85865d2014e0bd47e04e57fbba5088d9e3b757c
SHA25644856ea030ad0c86027b52fdf7c920315e7e678cdd2f0d3e8b54fa6c1c18682d
SHA5123c10801e04069fa40568d2595207c284599cdda41b14de850beebded417da889c330d990c617cd951168fd11af867e3eb19712e375e81c6496518d5d61ccf6e3
-
Filesize
172KB
MD50280f238090b0f061805b76ddcef3a94
SHA198b1a0f93cbf5e255a114616999649119ccfdd58
SHA2563d65353b1a09711429959d3acd6f33eff5c1149c51df4316cd7349a52001f7c8
SHA51263004daeb568499be2c32397f8425d93f55de249743a1f38e087926018340ddf9101912203e77027a935306fa5509e8b5eb8c7b407c42c5bf8d9cfce4d8dbb22