Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 23:55
Behavioral task
behavioral1
Sample
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
Resource
win7-20240903-en
General
-
Target
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
-
Size
508KB
-
MD5
9c5fb0c62ec811e3ee09c3c038c3f4a2
-
SHA1
965460b96e0039bab84553fc48a86dcc9530a827
-
SHA256
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c
-
SHA512
f367dc4f03ea54a0d5ff87ddade90a6c8b0e6e07c73d7c775c67221869a40a823e3edb3d66ecfdb7f4f4ceec3c96a310304ef07b03c53b72a4f1fd05822aa55d
-
SSDEEP
12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKoo:3MUv2LAv9AQ1p4dKJ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xeogd.exe716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation xeogd.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe -
Executes dropped EXE 2 IoCs
Processes:
xeogd.exeonfub.exepid process 5076 xeogd.exe 816 onfub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exexeogd.execmd.exeonfub.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeogd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language onfub.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
onfub.exepid process 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe 816 onfub.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exexeogd.exedescription pid process target process PID 3852 wrote to memory of 5076 3852 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe xeogd.exe PID 3852 wrote to memory of 5076 3852 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe xeogd.exe PID 3852 wrote to memory of 5076 3852 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe xeogd.exe PID 3852 wrote to memory of 5084 3852 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe cmd.exe PID 3852 wrote to memory of 5084 3852 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe cmd.exe PID 3852 wrote to memory of 5084 3852 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe cmd.exe PID 5076 wrote to memory of 816 5076 xeogd.exe onfub.exe PID 5076 wrote to memory of 816 5076 xeogd.exe onfub.exe PID 5076 wrote to memory of 816 5076 xeogd.exe onfub.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\xeogd.exe"C:\Users\Admin\AppData\Local\Temp\xeogd.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\onfub.exe"C:\Users\Admin\AppData\Local\Temp\onfub.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD55c1dd70bdbd4dfcfceea0531acb2cf8b
SHA15e45d5a1c99513e59435b399c8505f696166b313
SHA256b742d7d674f2590555cb69c78af2232cc5696d8e3a5abee68c68e26455008eab
SHA5128a9c00c7745a6c2c2e69b76edf0aa7e0b0d261b06e3a689a7b33a04425d2b925eb07372acb6be1ebcf9399cd24e22ae22312e60c60337023f8740b9365cc9978
-
Filesize
512B
MD5f3209657ebf2f9e118d89ff461e16e04
SHA11575529915b930c94939e324331819f170f7c357
SHA256de7392b5cea85d382a15720834b86c1a90426b92c7b6f3c91026c5dd95363a6a
SHA512518f61072d8d71071de03da938d4bc4c57e4c36e4b5021249cafd97784c3156e25973fc3f5bff3d8301cfba77097c50ed931f329f03076ded0268c68c251d86f
-
Filesize
172KB
MD56a4cc4f0f31f63da4bd1cb137a1f1dc9
SHA1ff42f6518cda1dff1e55d8e98a19bb56ab5d645c
SHA2567edce3bee342f5ff8d07c97ec09e8e8920d48c0c4364d2e7ce5c8c1e7cecdc47
SHA512a5a0d9b606c47e9972e37ba440dfa83bd24a1ef399adeb05cb4c19e4b8fd97163b281cce6bd3d2705b9e48305c757001c232542ae51d3f291e86d918dfcb4a87
-
Filesize
508KB
MD548a8d179902ddbd6ef34c8372cdbe084
SHA13ee071589019f0ab9f63949f8b732c64e489f9d9
SHA2567e7d592d0f7b56e5031cc102dfbadd0bebd3461af71e30f210220cdaf8d46d28
SHA5120595502088199b9cd5811de82cea1c3f06c9af2d7ca2e44b0113285e196c847cf20473cf4f5fc7fb5c9a968422ed8afa1f14dc6489368e25a2241a6595fd3a81