Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe
Resource
win7-20241010-en
General
-
Target
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe
-
Size
332KB
-
MD5
0c532605bd6041f0da53a6a9ade4ccc1
-
SHA1
b94d3dd6f45d0553004adc2672ce539f4ea8d613
-
SHA256
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b
-
SHA512
2019433e7f79bac22372cf967745ee5113a19507a523f48cc896e6ca4a769702f448770e11bef8656a9485038bf41eb72c25b203d1897ebc6a128fa0c72f6d87
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY+:vHW138/iXWlK885rKlGSekcj66ciL
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
busoo.exe3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation busoo.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe -
Executes dropped EXE 2 IoCs
Processes:
busoo.exeafopu.exepid process 2680 busoo.exe 2276 afopu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exebusoo.execmd.exeafopu.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language busoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afopu.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
afopu.exepid process 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe 2276 afopu.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exebusoo.exedescription pid process target process PID 4084 wrote to memory of 2680 4084 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe busoo.exe PID 4084 wrote to memory of 2680 4084 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe busoo.exe PID 4084 wrote to memory of 2680 4084 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe busoo.exe PID 4084 wrote to memory of 2068 4084 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe cmd.exe PID 4084 wrote to memory of 2068 4084 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe cmd.exe PID 4084 wrote to memory of 2068 4084 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe cmd.exe PID 2680 wrote to memory of 2276 2680 busoo.exe afopu.exe PID 2680 wrote to memory of 2276 2680 busoo.exe afopu.exe PID 2680 wrote to memory of 2276 2680 busoo.exe afopu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe"C:\Users\Admin\AppData\Local\Temp\3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\busoo.exe"C:\Users\Admin\AppData\Local\Temp\busoo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\afopu.exe"C:\Users\Admin\AppData\Local\Temp\afopu.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD58ce8b29932ebadf525fb715e36148a52
SHA16ebcdfc2916987af7c6adabbbe3731614a745f6a
SHA2564daef5587fdbc87677e9b08a1bc616a354407aa3137606ef19dfd5ca52a28093
SHA51211dd37baa32ae031ebafb3fa5b694f330b6c614cdfd85b0521bc967a8f37296c761858b33e37b86d5c6c38c7cd9a10c65d6e67fa62bb308e71be352ec7c9b80a
-
Filesize
172KB
MD5ea9fe46fac720119eaf20d2e390b8e4f
SHA1a79a0f81cf73870bac2c02972445c960a5bc6dd0
SHA256987b852dedbd8c51899ab876761de3910ed2197c4a23e3f57ea8f6f9cd029999
SHA512ed188515a97c097601e7ee88da96aee2f8b689b67776f7e4ec08e7a35870ec0edd3a1196f96ddbc57a7f0c9afb7dec0cec4d23fb43dd3d4944f99b887752f076
-
Filesize
332KB
MD588a561707a32b080e12e70aeee3597cf
SHA1446cb07088874a438a1cbff64af87167273c2eb0
SHA256d0cd2698a8137b7848d6421e9b97b23f1ab15a576e134a2d45e67daf9bd88e64
SHA512c268702b35a2c2773f99cd9057705fd752b8483b5e1c74660c5511832969527f4c2a886a84f29d69fed3571fe18fc760e7b750428a95784ef19220ba241d1220
-
Filesize
512B
MD5b10e219939e790cf9839c1b1c9257cc4
SHA1df06a11b1085ae28e8698d56dfebcc44370537c4
SHA2567afaf5258e72a455e07b3b3d9f02157095d022cff76990fb4838e44808ceb38c
SHA512a076f8a22bdd7132678563e9638054d728253e5fc39ae0eaf787bb3f875e4a306deec650eb1e38f1205465eed4d87d7997e61da41dd38230e636a5ce5765b7a4