Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 23:03
Behavioral task
behavioral1
Sample
99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe
Resource
win7-20240903-en
General
-
Target
99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe
-
Size
620KB
-
MD5
65d35b2b7a3f133701ff00a1e76afb42
-
SHA1
ec13f2169dcdfbb314a5310ae662b3581e725ad9
-
SHA256
99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a
-
SHA512
3de79931df7ce7837ee94333eba2ac58dac762c8dc5b9a04260a829178580c7213a57017a6a1d8fcb2f338db4337d1d6a6ee13bbedaf8d0111a48008ec34cadc
-
SSDEEP
6144:imbmLppYOuakYGWV5Q4XMxvQ4x1OpGcm9VQl0lM/oJ4/gupXWyKvt:ima6idv8zzkGHVqoq/gKW9
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exesoloa.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation soloa.exe -
Executes dropped EXE 2 IoCs
Processes:
soloa.exerubix.exepid Process 1152 soloa.exe 3376 rubix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exesoloa.execmd.exerubix.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soloa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rubix.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
rubix.exepid Process 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe 3376 rubix.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exesoloa.exedescription pid Process procid_target PID 4276 wrote to memory of 1152 4276 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe 85 PID 4276 wrote to memory of 1152 4276 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe 85 PID 4276 wrote to memory of 1152 4276 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe 85 PID 4276 wrote to memory of 4452 4276 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe 86 PID 4276 wrote to memory of 4452 4276 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe 86 PID 4276 wrote to memory of 4452 4276 99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe 86 PID 1152 wrote to memory of 3376 1152 soloa.exe 95 PID 1152 wrote to memory of 3376 1152 soloa.exe 95 PID 1152 wrote to memory of 3376 1152 soloa.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe"C:\Users\Admin\AppData\Local\Temp\99707ea09d06eb7f68d3d95581157bdf76b97e890f9f514932ed1622c1df760a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\soloa.exe"C:\Users\Admin\AppData\Local\Temp\soloa.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\rubix.exe"C:\Users\Admin\AppData\Local\Temp\rubix.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5856bbb6c21940c7bf810249bb185b531
SHA18fa05569b483d0840d96d9cb299c1ba567943bd4
SHA256dece50b9d42a904b715f2a4a76cc93cd97ec16070be9ce1777c220bc391e38f1
SHA51264ebd86b032913eea99c4e9ad98c4a835a4d3ef5724904cb742eb070b34e669b741ab26a377433aaaa5989236c2c0ab3e48682655b778c9ab5b3036d3275bf84
-
Filesize
512B
MD5585f2d450697ac8e491643279b561f6d
SHA14efb24acfd04f319ffd7df34e4c7f29f5adbe1d5
SHA25605f86736703ff452d0cd6a9f719bbbf9a3d1e0d4e850725c3423eaa260a5f0af
SHA5127e8e7a8eef57ac95a92b7798d4e9c3a5639e0a0ea0347d0b38db47c387b5e800f307b786fee518c0320f4faf38bb5e05d8bdddb35ede571a07477227206a117e
-
Filesize
203KB
MD59d48e3e7fe26949ce44a1ac45173cb07
SHA1580b053dbf84e3af46337f878b95536c9aef9c57
SHA2569439aa7cca5dfe86e67e6b65f5c48908529eb84dad8fa77b1055d2377be29eb3
SHA5129aa091c7e10f35c09dc1568241d4386bbdc71c7baece6fc8799d5ddbef5fc8b6f143d1a9cf49486bf4a6993e39d4490fda9a012074fdec1e8cc8ba813a67b459
-
Filesize
620KB
MD5ffc98bda078e9c685614b583875e181b
SHA1b1bca9fc88c683187e6d295a4076f7301cc8ddd7
SHA25618cc0f0eea43719d67fcb1ba3592b5f6078702e57e39440afadfb542a9d225f6
SHA512511a3f9a1eb098c079b7c081caa6d415c9c9fa11325b3b6d1b0ba6f26177612e2add0fda0c3338975b8caed81da12ce0a14929ab2328d4dc860109db7c05217b