Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 00:12
Behavioral task
behavioral1
Sample
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
Resource
win7-20240903-en
General
-
Target
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
-
Size
508KB
-
MD5
9c5fb0c62ec811e3ee09c3c038c3f4a2
-
SHA1
965460b96e0039bab84553fc48a86dcc9530a827
-
SHA256
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c
-
SHA512
f367dc4f03ea54a0d5ff87ddade90a6c8b0e6e07c73d7c775c67221869a40a823e3edb3d66ecfdb7f4f4ceec3c96a310304ef07b03c53b72a4f1fd05822aa55d
-
SSDEEP
12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKoo:3MUv2LAv9AQ1p4dKJ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qaqih.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe -
Executes dropped EXE 2 IoCs
pid Process 4120 qaqih.exe 380 xocic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xocic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qaqih.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe 380 xocic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2880 wrote to memory of 4120 2880 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 83 PID 2880 wrote to memory of 4120 2880 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 83 PID 2880 wrote to memory of 4120 2880 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 83 PID 2880 wrote to memory of 4464 2880 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 84 PID 2880 wrote to memory of 4464 2880 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 84 PID 2880 wrote to memory of 4464 2880 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 84 PID 4120 wrote to memory of 380 4120 qaqih.exe 105 PID 4120 wrote to memory of 380 4120 qaqih.exe 105 PID 4120 wrote to memory of 380 4120 qaqih.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\qaqih.exe"C:\Users\Admin\AppData\Local\Temp\qaqih.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\xocic.exe"C:\Users\Admin\AppData\Local\Temp\xocic.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD55c1dd70bdbd4dfcfceea0531acb2cf8b
SHA15e45d5a1c99513e59435b399c8505f696166b313
SHA256b742d7d674f2590555cb69c78af2232cc5696d8e3a5abee68c68e26455008eab
SHA5128a9c00c7745a6c2c2e69b76edf0aa7e0b0d261b06e3a689a7b33a04425d2b925eb07372acb6be1ebcf9399cd24e22ae22312e60c60337023f8740b9365cc9978
-
Filesize
512B
MD5f2e38c5e7679e6775feaffd4b36bc432
SHA1fe002d047dda583587a8e70a97f0889935da329f
SHA256daf80ad4389376393306a6f60ccf0717205ee782237a0cdf4a522bfb37a48c0f
SHA51261220b0ed20c6fa587e035014d1c04bf945cb5d6eade1f6eb596911233b8ab0855cfa9b914b5506db63e98f00d435bab65736af4be18d5e48ff8901b925a49b5
-
Filesize
508KB
MD5215c7e7394faf2f52f8f8d2b7a6612e7
SHA163f9b95993454513c9a765660974618082be184d
SHA256f3771344134bb7e484c52e05ac616aa3a2aacccfd3a4613cdf2c40cef614803d
SHA512442a98d2b5b29a2135a1325320691fd0862856d19e2f48cca683fba8efcd483b6dcbe37c3a1fdf21451ffcb0e887d29640e56adc64af27eba6f4eec951d9ea04
-
Filesize
172KB
MD50f8813d89b33d670d8063b394ea9d18d
SHA1b130ec956efb7b3a88f2b5d6a72d7e1bee8de613
SHA256bd1549b5d9669ad61f63db502bceabb594338d80a2e6cfa3fe719bfaffd4dbfe
SHA512e095e6677c70c3d1c3b5283dd4a5657180b3cb00f83e5f491b5701c31d15109656180862594f7173ce015a7f25f3060c47f1f3071838f68de0aeeda31b6f36b2