Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe
Resource
win7-20240903-en
General
-
Target
f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe
-
Size
60KB
-
MD5
7dd2b583fa469d40bbc317fcc0273742
-
SHA1
b72c22035fb5d8592bf24dd66e2650c658abe429
-
SHA256
f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54
-
SHA512
b126d233e728ba8fd165946db9167c85bb57cfd9fc69230634a83b956c644b78da433fee79351920612b3b18de18bdccc80a0da81c9bec8fed421837827a665c
-
SSDEEP
768:n5mhew0GpSyMe6hwUkdwJzh+qciaQRENEzxZbARtR06g2wqp4YPeznellmqGwxPX:nK0GjMeQG3iaQREuVZ6ro29p4YxbKdU
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe -
Executes dropped EXE 1 IoCs
pid Process 4460 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4460 2852 f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe 82 PID 2852 wrote to memory of 4460 2852 f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe 82 PID 2852 wrote to memory of 4460 2852 f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe 82 PID 2852 wrote to memory of 1424 2852 f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe 83 PID 2852 wrote to memory of 1424 2852 f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe 83 PID 2852 wrote to memory of 1424 2852 f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe"C:\Users\Admin\AppData\Local\Temp\f63e7aaa3e5f29c1f80265453c271f72fa7da9243a984ed339b968fcdcf28a54.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5d20aea9217daa232ab67187c1cf8efb8
SHA1303475efbddaf532b647bdcb616420f3e81c171c
SHA256e2c41df680d5da8c8d1a67149e641bd935b8326b9fe607eeb7cbb028e69a537a
SHA512eb8a5bdedc9e009af9a0df2028ead09e9ec7a3fa8a6b1ced211d862299d2648c1bb5d8d8827e34cfbada5d022124b8ec1f2e3c3419ae595f74184052ff091d3c
-
Filesize
512B
MD555e10a9af74d3f3fa5ae3cb7ff5ad9d4
SHA1449221fd8d7196a54de2bd583625d8d1b64db56a
SHA256a945a44cfe50423c01f26a16445ed177a347052e791364a9cb7de6bcaa18f3c1
SHA5124af5ba74467b4c61302ea9571f19346c05f911843f2c6153fcd9a7340f9bc6e1f8867cdb72ec7ba0dc4930199aa5c302711ad5da9fd35241839418f6e70a515a
-
Filesize
338B
MD57fccd523c37f793e94ea2cdbdca2d891
SHA187eebc04edb7b0c939fd3ef6ae131447f91acb7e
SHA2565ddc62538b3e6303777224c2de8647e56caf45ed45f5c7fbfe419ff0505ed476
SHA5127ee3f43737493377a3ab71109dec0879a43bc51a31f139edcdccd210c4491f732c3c39589c077344bb959d98eebdc1b81e5746239f8cbb91c809e57c7e68a796