Analysis
-
max time kernel
119s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe
Resource
win7-20240903-en
General
-
Target
07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe
-
Size
299KB
-
MD5
961734c10247ab1d4672d4956693ec99
-
SHA1
3651660af03d37f27af50e2b002cb614c0b619cd
-
SHA256
07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f
-
SHA512
7ff8d2bd5d75ea18697f11bd8e9bf80cddccf5bb9960e55caad550a680021445c08da1eac0550dbd285e7ec5e4d99084eeeb1dc5519dd4fe0bdd4c96030d53d3
-
SSDEEP
6144:kN43gKpDPeVvnAmZ64XMxvQ4x1OpGcm9VQl0lM/oJ4/gupXSz:Y4npK2y8zzkGHVqoq/gK8
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation oqqef.exe -
Executes dropped EXE 2 IoCs
pid Process 2980 oqqef.exe 2696 geojx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oqqef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geojx.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe 2696 geojx.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe Token: SeIncBasePriorityPrivilege 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe Token: 33 2980 oqqef.exe Token: SeIncBasePriorityPrivilege 2980 oqqef.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 556 wrote to memory of 2980 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe 85 PID 556 wrote to memory of 2980 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe 85 PID 556 wrote to memory of 2980 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe 85 PID 556 wrote to memory of 3380 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe 86 PID 556 wrote to memory of 3380 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe 86 PID 556 wrote to memory of 3380 556 07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe 86 PID 2980 wrote to memory of 2696 2980 oqqef.exe 102 PID 2980 wrote to memory of 2696 2980 oqqef.exe 102 PID 2980 wrote to memory of 2696 2980 oqqef.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe"C:\Users\Admin\AppData\Local\Temp\07a7f7132bb4f75c48b174119c2be06ff590bd686680f0245900a9adc001a60f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\oqqef.exe"C:\Users\Admin\AppData\Local\Temp\oqqef.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\geojx.exe"C:\Users\Admin\AppData\Local\Temp\geojx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5a769c58c8df0b8578bc4a342b6c7b57d
SHA1e94d8dd0360677be5e733bfe6b91068497e7667d
SHA256732e1de266dc8d88c72a29824dc47b0b10a2fa2dbf0d344085ce68a8bdeaf5ea
SHA512a1e45babd45b375f22792eb50e60b0ea6d10ba5bd1605346dcdba3ff1d995fde8295d964064abb652d2e73f22a1ff5d656d02fb2fc470a12251333ea182c9d33
-
Filesize
203KB
MD55c7bb0b74e35b679143242c5ca90edb9
SHA10ad763798151adb7e77e87c26b4ae81e425a7939
SHA2564782199a7cf51b05a9ffd28996cdb391f18e3ea51728f968378594a86cc01170
SHA5128a8f674e155d1a6c8a1582cdf797618dd7477b44f6b9f9685d2686381453a10cb380f64d47f6b6b6b86a2d5757983b707d90f68e0c54d25a733fd97dcb50088e
-
Filesize
512B
MD50c2ffdb30fc7e8b9f41f0801ca8a8b9f
SHA1d5ac5697e59dfcbf7288576b83f146555c2224ad
SHA256f4edd009eeba6ac81cd2413c8c95e9aa7fea6db914fbd5cab945aa258ad72c99
SHA51248d97143a157a7315913daa79094f3c8946003c3391e6c8e13df931049609a47af1e1da513e9cd4a4d6eb5ed66c8990af8fade04d549c8e7059619cb96899d9f
-
Filesize
299KB
MD52cdd9673350a6f40d9fe85b92547e892
SHA1ae2f78f78538d40a3face9a088301be471261d37
SHA256293e691ceda329b331e43d7fa4a8e1403dde13a7d2bcbe8426eac9f7ee8c3cce
SHA512490feb3d0aa96e7b1b8fbd26ce6dc6181dcb4a215b3f77db755f0d960a92174273658e7922403b9be38036fed23c462ace08992998468032764c2cdfffd5d538