Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 12:43
Behavioral task
behavioral1
Sample
177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe
Resource
win7-20241010-en
General
-
Target
177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe
-
Size
553KB
-
MD5
d6c7c30a81e11dc1c86a310a1ae80961
-
SHA1
7c363777198b30a0f8e90df768f51396eb3d78a1
-
SHA256
177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9
-
SHA512
d85a4cef7b216f99e0da92b8b147659ec18e3e5ae17dcb4014aca1d599464e44bc0ca7d78bc2ac3f7f345e2270416f7a35693aa325df50690275924b2f7b2caf
-
SSDEEP
12288:++GtVfjTQSaoINAHT1VQ1i3SyQEW85gzlee:+rt4/NArwjs5olB
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exexyhis.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation xyhis.exe -
Executes dropped EXE 2 IoCs
Processes:
xyhis.exezoebe.exepid process 2428 xyhis.exe 5112 zoebe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4928 5112 WerFault.exe zoebe.exe 4448 5112 WerFault.exe zoebe.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exexyhis.execmd.exezoebe.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xyhis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoebe.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exexyhis.exedescription pid process target process PID 1192 wrote to memory of 2428 1192 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe xyhis.exe PID 1192 wrote to memory of 2428 1192 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe xyhis.exe PID 1192 wrote to memory of 2428 1192 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe xyhis.exe PID 1192 wrote to memory of 1168 1192 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe cmd.exe PID 1192 wrote to memory of 1168 1192 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe cmd.exe PID 1192 wrote to memory of 1168 1192 177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe cmd.exe PID 2428 wrote to memory of 5112 2428 xyhis.exe zoebe.exe PID 2428 wrote to memory of 5112 2428 xyhis.exe zoebe.exe PID 2428 wrote to memory of 5112 2428 xyhis.exe zoebe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe"C:\Users\Admin\AppData\Local\Temp\177bf16b1f55ba10c701e1af03e331fb11dfa9f935f5ffc6779feb0638796bb9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\xyhis.exe"C:\Users\Admin\AppData\Local\Temp\xyhis.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\zoebe.exe"C:\Users\Admin\AppData\Local\Temp\zoebe.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 2164⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 2564⤵
- Program crash
PID:4448
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5112 -ip 51121⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5112 -ip 51121⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD50f8b90ae5876106b0173d2f6bb3c96c3
SHA144ae65b3871372c78bc3a6ac75e146a2e010026b
SHA256e342bf119c88732bbedd6943e31f01255614c34f20079e5958da30a96e802910
SHA512ebcc4af2c96e6c919594316d1317e3b2cd471774f030bd645ada4d8a3c6010a36b582df29c4e8b83a39ffd779373ac8411931c77931052ddcfa9e0b5f5bdebf7
-
Filesize
512B
MD5ce0accb1a785c68c0a016b96544008f9
SHA1d0d0a7cdc490c83f0333cfb4d7eb69da94dbf597
SHA256e953ee74265cbc9a753337f02a5327d66fa5d2b9737dccc342a72f525437efae
SHA5121a6a01691abecf7a32cb61c6c1d1ba299479d2558c107688409036d152f18e2aad04b7a205102eb2aeea64973ea4a26637815f9b571153b318c9c82f6a0b3afe
-
Filesize
553KB
MD5850d16733f8f9109d38da3499366226b
SHA1e868a6bf62358a632d52a0a671cc940a4b337898
SHA2564d53dda4770c51735c8879754bd083adbae5efd9498bdd5300ff589840b12697
SHA512c0e01d900bd199a8f6a00455a94724e0465b7540018c0356360b151d0fe1c1bc975831eff3deb082583c062fca3e2ee3b87b1c6d1fd842a3fcc4c2d53f11e8bb
-
Filesize
231KB
MD5e9118abbb3cb91516f3eeee5fbbf908c
SHA14c44a393ea3e9565333d605881208950e158753c
SHA256a4047c8a5744f71e3b2bac2caef73a8ad9a32d9720116a31b28dda4406e6beeb
SHA5129b535a639988f36c3f0a79f95a4bc4999d4d3f3fc9f4c26169f0866434d7cda6dc3fee50c1b13ca13b658fc90add23251be651b3d43d1027d2d32bca369f1a8e