Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe
Resource
win7-20240903-en
General
-
Target
d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe
-
Size
6.5MB
-
MD5
106e3af15846334c1edb74dd2ffc3391
-
SHA1
5bf4021ee7e67ad451fca8881c8aed3a2d9ec819
-
SHA256
d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3
-
SHA512
d1a9780c55d37a2f0294a49df526cb691083f9721e4ea2bee38b552990d8a096b83b477f185066d197db8781d925e19e0445870be1df1de89cfc3f1a55a2d3c0
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVS8u:i0LrA2kHKQHNk3og9unipQyOaOt
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.execygeb.exezycuri.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation cygeb.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation zycuri.exe -
Executes dropped EXE 3 IoCs
Processes:
cygeb.exezycuri.exeumukb.exepid Process 4480 cygeb.exe 3112 zycuri.exe 4228 umukb.exe -
Processes:
resource yara_rule behavioral2/files/0x0003000000000709-65.dat upx behavioral2/memory/4228-72-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/4228-77-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exed9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.execygeb.execmd.exezycuri.exeumukb.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cygeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zycuri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umukb.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.execygeb.exezycuri.exeumukb.exepid Process 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 4480 cygeb.exe 4480 cygeb.exe 3112 zycuri.exe 3112 zycuri.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe 4228 umukb.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.execygeb.exezycuri.exedescription pid Process procid_target PID 3832 wrote to memory of 4480 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 85 PID 3832 wrote to memory of 4480 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 85 PID 3832 wrote to memory of 4480 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 85 PID 3832 wrote to memory of 4524 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 86 PID 3832 wrote to memory of 4524 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 86 PID 3832 wrote to memory of 4524 3832 d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe 86 PID 4480 wrote to memory of 3112 4480 cygeb.exe 89 PID 4480 wrote to memory of 3112 4480 cygeb.exe 89 PID 4480 wrote to memory of 3112 4480 cygeb.exe 89 PID 3112 wrote to memory of 4228 3112 zycuri.exe 105 PID 3112 wrote to memory of 4228 3112 zycuri.exe 105 PID 3112 wrote to memory of 4228 3112 zycuri.exe 105 PID 3112 wrote to memory of 4256 3112 zycuri.exe 106 PID 3112 wrote to memory of 4256 3112 zycuri.exe 106 PID 3112 wrote to memory of 4256 3112 zycuri.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe"C:\Users\Admin\AppData\Local\Temp\d9aa45ec3427a6e6c708173a154f54c59fc97f5deff7f3e8ea02ea848f4efab3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\cygeb.exe"C:\Users\Admin\AppData\Local\Temp\cygeb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\zycuri.exe"C:\Users\Admin\AppData\Local\Temp\zycuri.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\umukb.exe"C:\Users\Admin\AppData\Local\Temp\umukb.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD576225f238e082bd9dcf9d9a50cc1a808
SHA1bd8b0d57c3c90a2de27e0406b7e676334bc264a0
SHA256893c863424d49dda14f378e00b709533b95b4713b288834b25a98a7e36b1766c
SHA512bd912e94168a9e8ec54eab0dd279413877deb5a0c7050a25cf98f4e93d77feabbaf3f659f701ff90d188a9746e3356bec0dc2975a6f6225684c66460300fa7df
-
Filesize
340B
MD52179e03e2b7dc6367d2ce5113a197399
SHA19fa5b7feee4d01e89fb650d6b8b72f8947a7c331
SHA2563d34270a71ba2a5fb3067d3c0afc7648dfd781c695969d53875ea7a437fb1142
SHA512f185bb0cd19abd34a2ce0278694a885c38e40502ecf2b81c2812320fcd767d788241ed463b25536e142cf9117d1123ce6c9164f6be79d7bb98f0e666417705b6
-
Filesize
6.5MB
MD5991b5d4285c6831e2abb1129f0b483ca
SHA14a278940a251acfd8db5f2a498e4e348340f0a0a
SHA25696208dad49aafaf0b9b4cb4bfc53a9fb33549f47255cb7fc40aa1a534e658f20
SHA512b61ca8c4d580f96e7beed4775973a9e0c7ed5593ef287c79e6f3a11256b799784cf777f82dc10145a1041390c4e2e79168c321c3196564f0fd6832d2f714b468
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5cf607a268a42f6b80d86f2cc61d0636d
SHA1861d031184a96c302eec37021c43e3c480d6bfe6
SHA256172d408e9ea026873b74b03faeba4590200a247099e6e5579536fca50a9d8140
SHA512f6f63d87111d7375867aa935797b1e1bd82004268f767ee145224435415f8c2736a843147f8763a7a3ea60e7dc59c9405f3c6a837ff68691f9356f00cab7c3d3
-
Filesize
459KB
MD5c8c91f52bc6efa3053a4cc38968eaaa9
SHA173cc267af88d2ccd671f33222ef388c0652b45a8
SHA2567f421e729f9cd56bdd17b407854ea42d65628dad35e80eaf5eba1aead7b2f771
SHA512d82fb8ef62abbb27f2c995621815b64b54ba1057f7f21ec7848132c4d5aeb0d763743740ac2a1c715ffcdbd0d8c557bbae2701d0a7dfd91bb5e2f57c65c51034