Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 20:17
Behavioral task
behavioral1
Sample
7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe
Resource
win7-20240903-en
General
-
Target
7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe
-
Size
558KB
-
MD5
65a71e1537c72631e69b404ecde397a2
-
SHA1
9eb58a825e5e415cdc1b783109e1cf3b91a1e6c6
-
SHA256
7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15
-
SHA512
67b50dac679ddb6d13b667a5cf19b46d3332c46cbe617a6180b4916692607275bd87f590e878f47137116827b13b7cd7352fc9258e729f3f8998a4eccdc73442
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEy4:znPfQp9L3olqF4
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exefavyb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation favyb.exe -
Executes dropped EXE 2 IoCs
Processes:
favyb.exekuduh.exepid process 3632 favyb.exe 900 kuduh.exe -
Processes:
resource yara_rule behavioral2/memory/1352-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\favyb.exe upx behavioral2/memory/3632-10-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1352-14-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/3632-17-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/3632-28-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exefavyb.execmd.exekuduh.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language favyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kuduh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
kuduh.exepid process 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe 900 kuduh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exefavyb.exedescription pid process target process PID 1352 wrote to memory of 3632 1352 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe favyb.exe PID 1352 wrote to memory of 3632 1352 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe favyb.exe PID 1352 wrote to memory of 3632 1352 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe favyb.exe PID 1352 wrote to memory of 4944 1352 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe cmd.exe PID 1352 wrote to memory of 4944 1352 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe cmd.exe PID 1352 wrote to memory of 4944 1352 7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe cmd.exe PID 3632 wrote to memory of 900 3632 favyb.exe kuduh.exe PID 3632 wrote to memory of 900 3632 favyb.exe kuduh.exe PID 3632 wrote to memory of 900 3632 favyb.exe kuduh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe"C:\Users\Admin\AppData\Local\Temp\7e3e8afd2af3dfbbeed61b25cf3a2d9c696fc4a86b91ac9270f3b63eb281eb15.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\favyb.exe"C:\Users\Admin\AppData\Local\Temp\favyb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\kuduh.exe"C:\Users\Admin\AppData\Local\Temp\kuduh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5cf6b9cdbb07d4770f57d7d9a45893b50
SHA107c7d7b78fee0e31dc9870c9e8314462d7e2d3bf
SHA256c21be26ad851861f45cc1e9e4c849a85963be330f04055c4fd4ec12cd173248b
SHA5122232dd6402a89936d679a9383a71eebe0cbd443c2ca723a8b5809b622442ba9650d1da25f859f655f40e2dcb7461e1add977a608b3e78dd5da531525a577f205
-
Filesize
558KB
MD506f4a45520fcf9511755cfb47ebd7116
SHA10e3adc2ba16b1eccd1149fe426fcd73ce030963a
SHA2567b046cddc29d6cd78af7a1e97953d2ff8171f5bc0e9da7496ce6cad3200d2b4f
SHA5126f1f1648fd99ea8b86723735032befaa6ee24028adb770d7be614bc44875884f47f24e1d39fbc2f92c7753c2352131167bd87ef909904167d6450ef9345c6c3e
-
Filesize
512B
MD566526bc01be3319388a50aa99fa46cfa
SHA1a018fd94f5e7883198688483a3f8d595535ff62f
SHA256ec8099c126feddf351747558110b3b832831ab69790f69315f99a1275bb52dab
SHA512d64efce169bdbef04d03728c3efdb8b6d03983c7cc255da15fc09a52ede16191193b3feef72c6e26ba033937159027ea898b25753712aadc17399ee7585f5466
-
Filesize
194KB
MD572ce34fb6b51b46e943ec36aac71083b
SHA1c2586f3fc7cabedccc37477eb5c3e2438058267d
SHA256be4ddef9d56b50bd47b7a8a4dbffab7d892e451420d826dbf93b9fad4253994e
SHA5127b01940a60f748a6e9adeb424e547d91e61d76575c72f20d0be96c087637f97a8d2f78f1ba53fab9aefe28b2caf85685178fd7369e40c21a8f1ef6ffa3cbcccc