Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe
Resource
win7-20240903-en
General
-
Target
8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe
-
Size
334KB
-
MD5
0a08b52fa7d91e9475ef6f51e3485897
-
SHA1
5ee172a5004107e4c9e799512916c2cede15946c
-
SHA256
8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16
-
SHA512
2a75e92ee8e3f559e6a2c727746dc80a5227f4043d6881cc42151b39c34cb1090229c4ae0286a8ce7350e54c681f94589f5a6a8faea6afa88773d1d725eb6a01
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYw+:vHW138/iXWlK885rKlGSekcj66ciV+
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exehycot.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation hycot.exe -
Executes dropped EXE 2 IoCs
Processes:
hycot.exeyctaq.exepid process 2568 hycot.exe 3576 yctaq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeyctaq.exe8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exehycot.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yctaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hycot.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
yctaq.exepid process 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe 3576 yctaq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exehycot.exedescription pid process target process PID 4908 wrote to memory of 2568 4908 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe hycot.exe PID 4908 wrote to memory of 2568 4908 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe hycot.exe PID 4908 wrote to memory of 2568 4908 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe hycot.exe PID 4908 wrote to memory of 1540 4908 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe cmd.exe PID 4908 wrote to memory of 1540 4908 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe cmd.exe PID 4908 wrote to memory of 1540 4908 8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe cmd.exe PID 2568 wrote to memory of 3576 2568 hycot.exe yctaq.exe PID 2568 wrote to memory of 3576 2568 hycot.exe yctaq.exe PID 2568 wrote to memory of 3576 2568 hycot.exe yctaq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe"C:\Users\Admin\AppData\Local\Temp\8101c1fedee09f7b280a2d5e509e00ce438d5b8bfdcbf8dd45b921b8e5c7dc16.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\hycot.exe"C:\Users\Admin\AppData\Local\Temp\hycot.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\yctaq.exe"C:\Users\Admin\AppData\Local\Temp\yctaq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56f7b7a8f89495df2f21696848c2956f4
SHA153ce0ee385cf843e8b0f8749cdaaeb1e8212f13d
SHA2564f60af66e78d9e66006a323ea6947ea15c1d6e9b6161c5c4528eadd6e0164603
SHA51264cde6f881bf6a0a726be814a678eb08f1e84548b77356fb4fcc8a53fafa74754275e8e630342f9c5b0abaa7fd7d8bb37c05353d59c33b8e83d8909280f48e42
-
Filesize
512B
MD5ac1c87599baf576651660486f7fcdc3a
SHA1a1d3f6c0fdf4afd36b085e45a589d2807d27fb35
SHA256ffe35ac2e94a5bdfa24969f3fe620e5f62310ce28b3400dacc060032f04857cf
SHA512f2613eaaeda80ad4501c4a793962129db2dec3eac83c08318302f1aaa7669acca3f22537760c41f16902d7f63e968cef1c05802372586276aea38ef0c1ca4002
-
Filesize
334KB
MD576378c30077cfe6929ffa6f378dc961a
SHA1a993ec744e227eb9d50bf76e0e659224760eec23
SHA2562c3ee8326913a391742b02436cb901884ff19181534d8b640df07026dfd0ca6f
SHA51208108892416f1415e5a435e6456c8442c449d151ce110151caec05cda98ca57d75121316d8891cdf95e2c7f88112a5bd417ec06dbb6e7bdfec8dcf204c004966
-
Filesize
172KB
MD5a4c4e302572c69609641963f73261ad6
SHA13ebabf266c755531922d3a958d072f8aa5b79e9e
SHA25653e216a7ef597fb70abbed0547c15b6395fc92b616895fab6ae2313e04256136
SHA512a6b829111e678e7de4529987079113ada46316189a0d2c782f7a65ee6fda971c9e8dead5840d31e137e7c8d05836d40d26f31874d28c8185d0f56ef4b5699c4d