Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 12:44
Behavioral task
behavioral1
Sample
bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe
Resource
win7-20240903-en
General
-
Target
bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe
-
Size
633KB
-
MD5
2dc85d1e4f325a156676d3bdde485025
-
SHA1
f2097f754cb08feedc7cf72ce6101004b000ee8f
-
SHA256
bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e
-
SHA512
b2bb12a5f2d33584cd7361f53f47b3db8a130540cfa38697f68806add1bba36ceb4f162dfd40700efc31d8628950c95d92ad8ea61df8c2831a59ec06d40313f3
-
SSDEEP
12288:RU7M5ijWh0XOW4sEf9OTijWh0XOW4sEfsf:RUowYcOW4a2YcOW4Y
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\duzoz.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exeridop.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ridop.exe -
Executes dropped EXE 2 IoCs
Processes:
ridop.exeduzoz.exepid process 3520 ridop.exe 1472 duzoz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exeridop.execmd.exeduzoz.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ridop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language duzoz.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
duzoz.exepid process 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe 1472 duzoz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exeridop.exedescription pid process target process PID 5016 wrote to memory of 3520 5016 bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe ridop.exe PID 5016 wrote to memory of 3520 5016 bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe ridop.exe PID 5016 wrote to memory of 3520 5016 bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe ridop.exe PID 5016 wrote to memory of 432 5016 bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe cmd.exe PID 5016 wrote to memory of 432 5016 bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe cmd.exe PID 5016 wrote to memory of 432 5016 bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe cmd.exe PID 3520 wrote to memory of 1472 3520 ridop.exe duzoz.exe PID 3520 wrote to memory of 1472 3520 ridop.exe duzoz.exe PID 3520 wrote to memory of 1472 3520 ridop.exe duzoz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe"C:\Users\Admin\AppData\Local\Temp\bd5bb62464e24dd10460989a6c4c4e7c28094af0e22ca61f7c6ca8f853aecc9e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\ridop.exe"C:\Users\Admin\AppData\Local\Temp\ridop.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\duzoz.exe"C:\Users\Admin\AppData\Local\Temp\duzoz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5bd8ebfdcb1c1bca57830986e2ffe55e5
SHA1499a9acee565d3c71c58df966d275e8d98ba3cf6
SHA2568548951834db14210dc7e23fa89c207a74429dd8b5cf5bfc3b8d593fb2845c6f
SHA512b0e370ad45acda055505e41602571193b8a47987751232fde804c53b9c3cef9e0de478377f9e42c5a8fe9571fcbd4fe2f0e87c1dbeda9bb44015c5f94374a435
-
Filesize
212KB
MD504f0d2867c1055b2bd7a75bec3eac583
SHA12eed4de0eeeea7815f133a336d8b47abd9d417a5
SHA256701bddaa4ea6874f0c7cff8013538737b16c43309b666cd7f7e4cd28d3d92e22
SHA512bab03e1b1d638622c84a74d75d0a32ce2396d22b03f926068acb6d560d8af323efec9b2c6729df0136252557e978390eead1d335dd334171ed5aa7d46ad868c1
-
Filesize
512B
MD5c851b50e9fb7fafd40e5da3940146544
SHA1e818933ee572ffa15b9bd6133c2931b13d6070cf
SHA256b4f46102d3bbd595de1e0bdb47523a48e3a452e19c395304c96d7dc3e07acd41
SHA512cc382eec53cb21246728fdefb265ba1731028ea716b626a9824613aad8dc53fbaf9a3cc0110b4529e105fd81cfe07c7bd3247fdf850d763fe9debadd65aeb691
-
Filesize
633KB
MD5edf29fd91f0df8296d97ed1494d626a4
SHA1c8de47f2caeb64c242fa4990b683fd31730867d8
SHA25613ab7f0ae7ab78b4f2a878ac6268d9026e7507bb5b33c927969fe101d2874358
SHA5128ed811cb09c35e819df990329370ca50091cec0e67e4bb1108e4eb43315fd5f38330888bf875ab048d9d9259aad86f5601c890c0ea4bc446d57eaf32537ebb83