Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe
Resource
win7-20240903-en
General
-
Target
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe
-
Size
334KB
-
MD5
a52fd571b858e759fa3d71055f6eb4da
-
SHA1
244a27d85ea646e78cf4172f48c5dfb4ce19f676
-
SHA256
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04
-
SHA512
873b6207d64514e918c78b58d8aa287cc04253ac7304d7684f7d5a6972fd8ecce4ed14c8d07c09660b50e3599564ee7280116ba5dd3ee9d14b686c56f2e69fb6
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9:vHW138/iXWlK885rKlGSekcj66ciw
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exebopyf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation bopyf.exe -
Executes dropped EXE 2 IoCs
Processes:
bopyf.exefasiy.exepid process 752 bopyf.exe 1600 fasiy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exebopyf.execmd.exefasiy.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bopyf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fasiy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fasiy.exepid process 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe 1600 fasiy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exebopyf.exedescription pid process target process PID 4844 wrote to memory of 752 4844 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe bopyf.exe PID 4844 wrote to memory of 752 4844 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe bopyf.exe PID 4844 wrote to memory of 752 4844 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe bopyf.exe PID 4844 wrote to memory of 4604 4844 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe cmd.exe PID 4844 wrote to memory of 4604 4844 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe cmd.exe PID 4844 wrote to memory of 4604 4844 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe cmd.exe PID 752 wrote to memory of 1600 752 bopyf.exe fasiy.exe PID 752 wrote to memory of 1600 752 bopyf.exe fasiy.exe PID 752 wrote to memory of 1600 752 bopyf.exe fasiy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe"C:\Users\Admin\AppData\Local\Temp\2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\bopyf.exe"C:\Users\Admin\AppData\Local\Temp\bopyf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\fasiy.exe"C:\Users\Admin\AppData\Local\Temp\fasiy.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD520c83f80a5acec8c249db950cfc1da70
SHA17011eccce8a8f5f75bb918352da262a7ceedecf3
SHA2567c238aeb10ae6f42e26b1d93b45a248da7d82b4a7f2a921497d88a224ed00d7c
SHA512d465772a1a83ed1dce57a079966dee04e7c249d77bb53c0b9bf8b663920e8c4167da90d29f4b5d1009193f9efcda9c62f8909d90010df2d159912d19378e4de9
-
Filesize
334KB
MD516f360f277b5f994d41641b4c9ead193
SHA17987bcb1abde16c0f1ac8ef496233caaffeeefd2
SHA256ace6d192e79455327629be545263496ceaaee04fd3ea96323569de57d330882c
SHA51233db0ce4dd6b91e91e0c378c11e5e8d3c8f10cd9b0e6b2d171a41bb32636d20d41e83114d56dc75bf34769aceafddc43b7e8095aa6fd2a2016a258774a0bffbd
-
Filesize
172KB
MD5a17cbc8bcecae87c3c7fed46ba671c9a
SHA1159ac8425a0139a2e5e16aa9f9911dd527bffc78
SHA256309cdb9a2fc82b5328b5a728066b9f3ccc36fbab806c32c159734348ad516ab7
SHA51248c0d99c759c7f5a999f2249fa73cad95327561f6cd924472f32cc8b17a8690424436a6f3f4aca820f79b3eb789ee91dd8a39dc8d526a7603794aea8e39c6bd3
-
Filesize
512B
MD568a39fa97a4acd22b288bf92b1d942f5
SHA14579c9aa7f4187b4eee7f1b534c2c60fcbeb260e
SHA256c48da27441a4cbf5417805663525884e723e2c268262c9b0e2eee94b81d266cc
SHA512f526cf234561797efa7ee214c846d7ba111a90f404d9c5494e431b6ef3de99d53b97f8d6082482d688d83d3ee056d54e15b47e7a9742872080f0aeeba62398aa