Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:07
Behavioral task
behavioral1
Sample
3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe
Resource
win7-20240903-en
General
-
Target
3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe
-
Size
537KB
-
MD5
b20e55b1dcce2bfa5356a84bcd9da7d9
-
SHA1
79e4dffeb55d8c3818ad3b8ce3c1048f9baf92ee
-
SHA256
3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124
-
SHA512
dc7ac12b0c4df4d4d0d31875fce8c4e2fec5ede05cf8ffa26a2bae6e8983ccde39550535c8d9f06b0130994de5ebe96fc66a0a5d71075c2318aab92e3eb29480
-
SSDEEP
12288:q0nPhglq2Uyt4R/b2G/0hznQGoexBU/NPg:q0P/k4lb2wKatg
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exewycyt.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wycyt.exe -
Executes dropped EXE 2 IoCs
Processes:
wycyt.exegogim.exepid Process 1968 wycyt.exe 2008 gogim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exewycyt.execmd.exegogim.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wycyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gogim.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
gogim.exepid Process 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe 2008 gogim.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exewycyt.exedescription pid Process procid_target PID 2804 wrote to memory of 1968 2804 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe 82 PID 2804 wrote to memory of 1968 2804 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe 82 PID 2804 wrote to memory of 1968 2804 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe 82 PID 2804 wrote to memory of 3608 2804 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe 83 PID 2804 wrote to memory of 3608 2804 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe 83 PID 2804 wrote to memory of 3608 2804 3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe 83 PID 1968 wrote to memory of 2008 1968 wycyt.exe 94 PID 1968 wrote to memory of 2008 1968 wycyt.exe 94 PID 1968 wrote to memory of 2008 1968 wycyt.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe"C:\Users\Admin\AppData\Local\Temp\3c1195d085a9ac66a0f1ddaa1e832855c5a45f5db35ea1953d6bd3b48dc46124.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\wycyt.exe"C:\Users\Admin\AppData\Local\Temp\wycyt.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\gogim.exe"C:\Users\Admin\AppData\Local\Temp\gogim.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD550246892b31984ab4015a5076fcaca9a
SHA1882bda725f7c0a959de66d3ba722344dc5aa2814
SHA2562c8d08bfb822716eb5c40d51356621af10b57d043c97a87a93b06f27ef047651
SHA5121697fcc1bd015d7bdbbde0230248ecd465f16acf8ea7143465f6ea326b558e1797a7e28132f374f58b360757fca57659e7f4481c926b199f712c6579442533a7
-
Filesize
236KB
MD56747277e3eb011b96f7664db8a35e2b7
SHA18c7a7d4246fd6bf8e0c986566510a43f9e235f03
SHA256b0ea677028a4fc97f1ea66b5c76d2ca802107062f02db71b81bb03b6dbb73a10
SHA512c172fc05d8b4594c2e7876894fdc2053a662c78d01eaaef3504f0e3405d32c509b473e9ae34732478326b3560fb7715344502774057669b3b99c3a3b888ef17d
-
Filesize
512B
MD588a8b8068999d5cad755db072f0e8cc4
SHA16618c117c64556b0ad1d511c8201e8ad786b411a
SHA2568e8cb95e626787f06bcc0d4895fda71dadf582bc7728b198c1033723e636776f
SHA512880ae796bb08acef13f975906c44854da1ed22dad63ecdfc527ac08467d156398e233611df07296c506af81da8aad522b181e8fe6d756c53875b0fed3d209d77
-
Filesize
537KB
MD579e9444c2af72b616d387fd26782a300
SHA19d14978943629c314565288e85cb7b2cd21c072e
SHA256088cc8b9dccd1de693909fadbaec82abb4fad31d19a1885ed1f6e0f1da48dc69
SHA512a8f9c04e77fef46d525122596a8e8a77087aff148b0b8250ca66c025af67b014b77ab44bd18e54eeac6f92efe91b8340e5ed2c739c15402a743990c36d0dd5a6