Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe
Resource
win7-20240708-en
General
-
Target
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe
-
Size
331KB
-
MD5
7eee5a9c09ab106a678b4e266607e694
-
SHA1
7a4f8588d6089f4b8e25582bc11dfa9e1302df84
-
SHA256
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb
-
SHA512
4ecb3d5966d401af3b4969563e8ccf3157c63b56a48b829d70eded05e7f1aee8a13241393363f6f62a73daa868a2e864dce2ca95b85190ba19ca59de1c9e5f9f
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVRJ:vHW138/iXWlK885rKlGSekcj66ciERJ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exeafbin.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation afbin.exe -
Executes dropped EXE 2 IoCs
Processes:
afbin.exeymfaz.exepid process 3524 afbin.exe 232 ymfaz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeymfaz.exe9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exeafbin.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymfaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afbin.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
ymfaz.exepid process 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe 232 ymfaz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exeafbin.exedescription pid process target process PID 3504 wrote to memory of 3524 3504 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe afbin.exe PID 3504 wrote to memory of 3524 3504 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe afbin.exe PID 3504 wrote to memory of 3524 3504 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe afbin.exe PID 3504 wrote to memory of 4924 3504 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe cmd.exe PID 3504 wrote to memory of 4924 3504 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe cmd.exe PID 3504 wrote to memory of 4924 3504 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe cmd.exe PID 3524 wrote to memory of 232 3524 afbin.exe ymfaz.exe PID 3524 wrote to memory of 232 3524 afbin.exe ymfaz.exe PID 3524 wrote to memory of 232 3524 afbin.exe ymfaz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe"C:\Users\Admin\AppData\Local\Temp\9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\afbin.exe"C:\Users\Admin\AppData\Local\Temp\afbin.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\ymfaz.exe"C:\Users\Admin\AppData\Local\Temp\ymfaz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56357433b9e289fbeedec0c4e4ea64826
SHA1b1e70d0a33000976fee37bd86ec4b4941fe0e670
SHA25626310e4f8e01c3574aee93d0394314e49692bb70bfc4562d80d09b66adb46428
SHA512af021ae4d737d676154f27f5478f91afe8e29993abb71f4b82d2c04a62e4388323c5ed3bd6737f696f691828c587be114cda834375db1475e79e10a0e55b0ad3
-
Filesize
331KB
MD52f3a5709514591dad56eec17af68430e
SHA1c2c1de50bc385bd43047ced3552a94589ad75a7b
SHA2560411bc5f6c67a59548a3407849d642d9f67b10a0d6d3857ae7579c2ad8dcafe6
SHA51221662ec5afc73f4097eb343cc81301b7eff78705bc59dbda9630d220b5ce552a244fe54b9329f93a9fa1cb23802865913aee22b92eaf3a6b6e379c1282fc0005
-
Filesize
512B
MD54aad266ad8a96609f869d93b3850519d
SHA107036439f29c46caab6c3a144cebce67e6995019
SHA256ab1e19b69698755a3973f6b9f445dcd680175bbfee7f1a13640f5559f38debe8
SHA51296d338c08619bfb2d64a9012902188420fd687739f2ec0c45f012e81b520ad52d0917b92ab742928c2a521dc022a566c6cf61d7349ad39faca107e2ffc2f824c
-
Filesize
172KB
MD5f83c2b9dc411e362fdfb4bfc4f78cc8c
SHA19a66cb83f74d3830cc60009927fd3429cac2a4a2
SHA2560cd2cf113c5429d42d2d95cd888f2d527c5fcfbd3e418fb285e6cf39d6df88b3
SHA512f7eb20b72b1744ac7e260d9a6b9be276298f2c4e5219a3f6172839c455dbc3b1152e6aa7b12bfbd97c90940103754f251b630277bb2bb99fb47b53e366382ca7