Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 07:49
Behavioral task
behavioral1
Sample
03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe
Resource
win7-20240903-en
General
-
Target
03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe
-
Size
537KB
-
MD5
cd8f8d72550c4fc793b2da453251ae5a
-
SHA1
7856e981408deea7ff865db131f03b7417175c38
-
SHA256
03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865
-
SHA512
815d0a545504969a977aea9c6c976532275344a5f556cabe57f4a5f683fd02054f54fe01cd1d77412f25edd254363fdb3f24d47282529a1d80cf7de438e4e8fb
-
SSDEEP
12288:q0nPhglq2Uyt4R/b2G/0hznQGoexBU/NP3:q0P/k4lb2wKat3
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation xukuf.exe -
Executes dropped EXE 2 IoCs
pid Process 4120 xukuf.exe 1964 eqgur.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xukuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqgur.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe 1964 eqgur.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2880 wrote to memory of 4120 2880 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe 83 PID 2880 wrote to memory of 4120 2880 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe 83 PID 2880 wrote to memory of 4120 2880 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe 83 PID 2880 wrote to memory of 3012 2880 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe 84 PID 2880 wrote to memory of 3012 2880 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe 84 PID 2880 wrote to memory of 3012 2880 03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe 84 PID 4120 wrote to memory of 1964 4120 xukuf.exe 104 PID 4120 wrote to memory of 1964 4120 xukuf.exe 104 PID 4120 wrote to memory of 1964 4120 xukuf.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe"C:\Users\Admin\AppData\Local\Temp\03963180889c76134a4eaa597f97dc888d24bb77edf90f23f6d27eee58946865.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\xukuf.exe"C:\Users\Admin\AppData\Local\Temp\xukuf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\eqgur.exe"C:\Users\Admin\AppData\Local\Temp\eqgur.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD537dac236676a663a57ed8089ca8225f7
SHA10a5b5119067a9dcb2a19f3b0a1732527c857e664
SHA256b9130b9721de831ae89992a64bef70d6d7561403b4f45903c8f534da6cebf059
SHA512bfbb2da2f9d9929105308462d60c1ba9e3fe1819d89e8f216744a68baf9fcee225eb9bf1efcaad6d46a6dc2bd7ab55649756d48705105efac2fad4942746ec5c
-
Filesize
236KB
MD5f1d498846661754146256f3b5c2cb878
SHA10fb25920aee82ae1d4ed1fb5166abfb59d55379d
SHA256fa4844b06d914f4f9f6c17c7d9a92919c1ce2db0755b73d0d3cf9de1a6f95b80
SHA5125e93fe500587acae9a16ae8487c7d1c4ae31f12a10448874c8ff689fc55f3298b8d07cbcc1a743f7f267e20f937b15c0aa411604f318a7152478ea746f5ba64b
-
Filesize
512B
MD57b627470864822bcdc5279e9ead76034
SHA135ae871cff2842ec737eeaf7ced170fcf7b381c5
SHA2566f7ddf9f9662ccbbd741a1d4b4301af69ff180f7627973ab0ca1b604a17a3927
SHA5124b6b75bbf3d2b991687f71f569e06a3d1c50c94deed6a9d7976ca869bb7ab8faf79c313d41597ea29f6b3e1b0e033c2974f2829d7bcb3795f9a827ea2863ba45
-
Filesize
537KB
MD5dcb1aaba9fb422ccbc86602105b8e611
SHA183761bf78339194e7c870f9984f372737b011058
SHA25697defa73b7cd45bd4e786894a87f7318cd32963640253ebb40c182ea7c8525bd
SHA512c1b7156402d68020bbab540ea8e61896f841968aa412fcb9c2018258050abb5b182d42df8b3cb0396020e5b591cb52363a36af2bb6f8b7bf66fd6825fa221b39