Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe
Resource
win7-20241010-en
General
-
Target
d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe
-
Size
327KB
-
MD5
21aa8a97134af1d02680d1663104bff5
-
SHA1
831ddd59a95c1c636e5a436e759ca8e2ce92cb87
-
SHA256
d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc
-
SHA512
be46e879c6295a7894ca01bf70e5a0ad41eed05977f6b37f334cdf798d7ec0d0ad7199c70cfef5eef1061e6218cbe4a24855949cb7891c7e28cbfd8a00e854ad
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYA:vHW138/iXWlK885rKlGSekcj66ci7
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exeuxumh.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation uxumh.exe -
Executes dropped EXE 2 IoCs
Processes:
uxumh.exeyvorj.exepid Process 4220 uxumh.exe 3116 yvorj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
yvorj.exed1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exeuxumh.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvorj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxumh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
yvorj.exepid Process 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe 3116 yvorj.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exeuxumh.exedescription pid Process procid_target PID 220 wrote to memory of 4220 220 d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe 87 PID 220 wrote to memory of 4220 220 d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe 87 PID 220 wrote to memory of 4220 220 d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe 87 PID 220 wrote to memory of 60 220 d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe 88 PID 220 wrote to memory of 60 220 d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe 88 PID 220 wrote to memory of 60 220 d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe 88 PID 4220 wrote to memory of 3116 4220 uxumh.exe 106 PID 4220 wrote to memory of 3116 4220 uxumh.exe 106 PID 4220 wrote to memory of 3116 4220 uxumh.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe"C:\Users\Admin\AppData\Local\Temp\d1b20cc74a975e8eb83c41cfa9105f03b5fd676ec99ee3b551ca004623effabc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\uxumh.exe"C:\Users\Admin\AppData\Local\Temp\uxumh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\yvorj.exe"C:\Users\Admin\AppData\Local\Temp\yvorj.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:60
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD51b9ff2150ddd1e9755f7aa1e4a0f45e5
SHA154de279e4de57893783f503bdc41ea27aa7f0bf7
SHA256ff1093f77a866b52f10cdf6488e5a1496abda1f80a8a9ae00fe5e5c02a7070b8
SHA512839cf53d4563e0ec6d825e302b00d5fb66fc29cc31845dfaf3137cc135b95497efc88f5c48603f104b525ed0d0693958c2f83b6660ec3bfa2b3d7e2af47c8108
-
Filesize
512B
MD5a2f5cf06bf8bb4f9f8db15f6b2d5dbfe
SHA153775f8fabf3ad9bf2066567dcb5ea8abe63822f
SHA256118e230911d45ba2895f5af164da3b7f4c2e366953f5010d3ed385e3e01c14ee
SHA512ff9289363aea0821241c4db77e0507e2070949c370d79241f8ed70e6f4fbc29be3da7bffe35fa471050cbecb53d96a4e07abb20444a4d44f27b37d345c5d1b77
-
Filesize
327KB
MD56fe362b183130f65cb170338296a6368
SHA1bd9d4754056b8092296c1f45ee159fe2b3b2f0d2
SHA25618d2747decf20ad59c1c507bcb892db477e66284b8eab5ae4dd3522ef556780c
SHA512c10d8366b5aeb4d58e2ed159f9f3b6a4dc992b99d45e74d5198d7d1e64acf8b847e74161931f125a5ca2b62c1f1cfa6cad135b05153ec88b14eb5fcdffd21c93
-
Filesize
172KB
MD59bc051e993a3afd4a7e7377928b7eda5
SHA18655884c57a4b5df647f0662bb03c640a3d52a21
SHA2564d5d47d2d4f428eb543199c92bd3cf33d9840e72f211f0f7675c1992ab042734
SHA512d829f5c4a31025aa373b845fadb83a91618e91d51bd4c9cc3564418ffee8b80232c3ed828e3446c34689e649ffa07f1561609b14fd1c234b85d95dfcccea6265