Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:13
Behavioral task
behavioral1
Sample
22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe
Resource
win7-20240903-en
General
-
Target
22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe
-
Size
621KB
-
MD5
f61a413e1e72f6b12bafe0daf6a43065
-
SHA1
749c7a8634e4e761c6a25beb5e9d1708e115adc4
-
SHA256
22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429
-
SHA512
41ea3f80938116195484ca47c98d1682541a9e1b9e9461163f5533c5f0f1ac39c913f24e7cdefb24197a90c084f3b539bf48c1a1eb92a5d86eb1db2ef0fa6934
-
SSDEEP
6144:imbmLppYOuakYGWV5Q4XMxvQ4x1OpGcm9VQl0lM/oJ4/gupXWyKV:ima6idv8zzkGHVqoq/gKWd
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation odkyx.exe -
Executes dropped EXE 2 IoCs
pid Process 3844 odkyx.exe 3920 ahpuz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odkyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahpuz.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe 3920 ahpuz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2756 wrote to memory of 3844 2756 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe 84 PID 2756 wrote to memory of 3844 2756 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe 84 PID 2756 wrote to memory of 3844 2756 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe 84 PID 2756 wrote to memory of 1796 2756 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe 86 PID 2756 wrote to memory of 1796 2756 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe 86 PID 2756 wrote to memory of 1796 2756 22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe 86 PID 3844 wrote to memory of 3920 3844 odkyx.exe 94 PID 3844 wrote to memory of 3920 3844 odkyx.exe 94 PID 3844 wrote to memory of 3920 3844 odkyx.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe"C:\Users\Admin\AppData\Local\Temp\22fe8b86056cc28b39eed6b539e447af5ab0b036329784978a849b316e3fc429.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\odkyx.exe"C:\Users\Admin\AppData\Local\Temp\odkyx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\ahpuz.exe"C:\Users\Admin\AppData\Local\Temp\ahpuz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD58662a4449569921841277a35ecde317c
SHA1ea04f931bfc5ab82a8c86b9d1115d76864ee12eb
SHA256e305d985eecbd3c8ab73df8f335a32ef2c062af04264e5696df308846fe5e78d
SHA512ccb56f421bc6231835e0a95a18b2fd18f5d78250d44a35312e85d379a7dafc61d47622a414f3e1f716890a77a777bc04eab36a4f445312db1ba190b0f08eabe5
-
Filesize
203KB
MD5343f59f2bb707997a2defaed3f2a9ddc
SHA17b62dfa5fde533c8a3e1a7867101cb8937741b92
SHA2568e83cb8209b07f0b22426b3a224355dd5b8b12b4752b63e56b26badfacbf388d
SHA51292145eb9141866e9d39e9865e5c70f1c960df05c9d004fccce635a2007ca9f48a1c6f8047f6ceb29efe57de07a0b70153a5a863ecf7ec0cb42442a973438bfe8
-
Filesize
512B
MD585aea5f23227d9be9ed241fa16499cc8
SHA182f9e1e30127f771e39c40f71f2bc5e830d6a9ed
SHA256e293c0e02e75177fb70a92fb36df749c0b347facf7769ab0ba956e41cbd8d22a
SHA5121f834f2ea48c9c8962676e9c6beb011ea795f9ecf22216035b9463c7129db63a960fd7e98234916a3f188d86a07ee999a774e021190e75cb66b7e5ca5551f57b
-
Filesize
621KB
MD5a3f1dfe1cac87c68926401ca94bd1abd
SHA189da19054c2893eabd591bb7d816f0ee95f490a3
SHA256fe387feb0d601f20cbb650b721a37bcb8d23996b6953f25a90d7f24b896930f5
SHA512fdb2ff54ac291ba6fd2821567c249702fb73e4df95adc601c4686ce83919577e8c99ae9c90b1bd374f362b2084477ddb598019c0a5bdcadddba34b3385f62c6a