Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 12:04
Behavioral task
behavioral1
Sample
558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe
Resource
win7-20240903-en
General
-
Target
558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe
-
Size
441KB
-
MD5
843997ebd749579ffd00b2a9fe6284de
-
SHA1
a7443e907bf47fb2b4b16f84ae9235ae90d73ff7
-
SHA256
558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4
-
SHA512
437db5146230455e04798bb2e2c87ed8313880d03450e766450b4508beb12aee63d290d67e0f3d65e8fd9ee04618fbe1a1b1cbff91011891d388a5777ab2e093
-
SSDEEP
6144:oEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpjg:oMpASIcWYx2U6hAJQnn
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xotyk.exehuraji.exe558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation xotyk.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation huraji.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe -
Executes dropped EXE 3 IoCs
Processes:
xotyk.exehuraji.exepikuj.exepid Process 2280 xotyk.exe 3636 huraji.exe 372 pikuj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exe558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exexotyk.execmd.exehuraji.exepikuj.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xotyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huraji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pikuj.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
pikuj.exepid Process 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe 372 pikuj.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exexotyk.exehuraji.exedescription pid Process procid_target PID 1080 wrote to memory of 2280 1080 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe 83 PID 1080 wrote to memory of 2280 1080 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe 83 PID 1080 wrote to memory of 2280 1080 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe 83 PID 1080 wrote to memory of 3836 1080 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe 84 PID 1080 wrote to memory of 3836 1080 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe 84 PID 1080 wrote to memory of 3836 1080 558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe 84 PID 2280 wrote to memory of 3636 2280 xotyk.exe 86 PID 2280 wrote to memory of 3636 2280 xotyk.exe 86 PID 2280 wrote to memory of 3636 2280 xotyk.exe 86 PID 3636 wrote to memory of 372 3636 huraji.exe 96 PID 3636 wrote to memory of 372 3636 huraji.exe 96 PID 3636 wrote to memory of 372 3636 huraji.exe 96 PID 3636 wrote to memory of 1140 3636 huraji.exe 97 PID 3636 wrote to memory of 1140 3636 huraji.exe 97 PID 3636 wrote to memory of 1140 3636 huraji.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe"C:\Users\Admin\AppData\Local\Temp\558367d11736d5ed87bc4038db2ec9a67cb0c79da07a269e043f2fb7063189c4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\xotyk.exe"C:\Users\Admin\AppData\Local\Temp\xotyk.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\huraji.exe"C:\Users\Admin\AppData\Local\Temp\huraji.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\pikuj.exe"C:\Users\Admin\AppData\Local\Temp\pikuj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD56c4ccedff7025e1d4c5cc77fb3319d41
SHA1e7495f061551e6c9560c33ea3f42aaeecb62e30e
SHA2561ac32d287312bc6f166e7695299464e1a4374652dd44a7a2d7761a95d78ce1ee
SHA512c73ef41139995924cf4a85d8ade77379763e9872eaf8ac60a78995e304850b0b2ace10e584a9cf3acc778be66ce9ae6d8495b1376918c9e6ec04f0782419947e
-
Filesize
340B
MD5e7aec06f39179b83c3a8a5baff53c372
SHA12b77ac89422753a0618451ff610ca0f1a77d7fbe
SHA256b7f0e8fec4c3a87ee80812323c8b41a84d17c7cf89b1b025ad2fb8024049f4bc
SHA512d58df9c794e0c691faea4e7a615aac806859faf8a1289a61019469a04438a4e5c3bb100239de2434985ae7e91c737d482e11dcbb48b57fbd2fb32865035a4c7d
-
Filesize
512B
MD5f337bd56796d6139cc4445fa0502dc7a
SHA10d6e6898e63a5d18c11cc8e9a10629e1c6e255df
SHA2566b30393a44152e1ebab5c4deb23977a9356c0d85a2fcf9ce9430d46be0bfae77
SHA512232a28b5145438c788c4ec26b758f51bbc5c8e9e296a6d2cb7022b9653845b0b53b36ca9752245c4d3f66ee271da340fc849ffe419cc7ac3d2f727047d33f32f
-
Filesize
441KB
MD58208ce39122d9a6ec79d82fd900109db
SHA1721837fca33e5e80e1bcf2f3779de722e53d922a
SHA2562ea7222548f72a660c1614ca3b83ac56123e9a8ea0e241303f377d6e13a4479b
SHA5129c6b75d0d758d27488a8f044972c2255a43a01773abc4d3a692a66ed490abc807bd978994cc71fa92efc27b6d73990da686988e547227802d0fa88d8b6684a87
-
Filesize
223KB
MD5c237895ddaceb3e4dbd518f84663b200
SHA10b0331a64a0b3d71a84b9ac4948e2507bb239bb1
SHA2563e7bb083db5877559473e9f8b28cef8fe3da42f030138665831a49b623c3d8e5
SHA5125499ec09d1e534f57188f732adc182a750ff8e613e43155660def196c491729d0e11a09ab5f2f9421a4075955f631ac1e87e8b696b9c4a739e3a5722a4e21dc4
-
Filesize
441KB
MD53720965ba9b02b15469fe34aea4ffa60
SHA152c295330c87ab3c0d7fe61e5ebaea601ba73a11
SHA25607d9950ac3fbe607ddb52538f43314cf3997f3c0bd55513bfdbe187c60837350
SHA512474828918ae03d0ed8e00f29d133f9eb718245b1c796b50eccb3ed380f689569c8bb5c8c82fb8c3bda2f51a81547fb6ebd783391126a95fe3d489b4beaddb2b0