Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 17:51
Behavioral task
behavioral1
Sample
5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe
Resource
win7-20240903-en
General
-
Target
5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe
-
Size
784KB
-
MD5
bbec813948c72f96a34ad5b3b10fd118
-
SHA1
03db2340afe0ae7d2d216edfc880ed36bfd6da9d
-
SHA256
5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d
-
SHA512
0c10dc61b10143e201660e20ac0fa4e4edb2ac1ffa7862d3e3572f923886e31669583498ee54ead67453724134ded9e6b4da1331a4b353e1c53215b40ffc4239
-
SSDEEP
12288:d7dL4AkwWNk82HAEGfKKBhVGT5OY8pgA65t8mv5pThkJ8HxW0d8GYEgn:d7dLBftJLW5YUWLrkJB0PJgn
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dogec.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation kugavu.exe -
Executes dropped EXE 3 IoCs
pid Process 5056 dogec.exe 3732 kugavu.exe 2236 jeheo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dogec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kugavu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jeheo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe 2236 jeheo.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2708 wrote to memory of 5056 2708 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe 83 PID 2708 wrote to memory of 5056 2708 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe 83 PID 2708 wrote to memory of 5056 2708 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe 83 PID 2708 wrote to memory of 1912 2708 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe 84 PID 2708 wrote to memory of 1912 2708 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe 84 PID 2708 wrote to memory of 1912 2708 5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe 84 PID 5056 wrote to memory of 3732 5056 dogec.exe 86 PID 5056 wrote to memory of 3732 5056 dogec.exe 86 PID 5056 wrote to memory of 3732 5056 dogec.exe 86 PID 3732 wrote to memory of 2236 3732 kugavu.exe 104 PID 3732 wrote to memory of 2236 3732 kugavu.exe 104 PID 3732 wrote to memory of 2236 3732 kugavu.exe 104 PID 3732 wrote to memory of 4672 3732 kugavu.exe 105 PID 3732 wrote to memory of 4672 3732 kugavu.exe 105 PID 3732 wrote to memory of 4672 3732 kugavu.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe"C:\Users\Admin\AppData\Local\Temp\5a5cefab37f78e90efdd6d0ce940bfec022f64a6702b856a704a6500d5e4756d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\dogec.exe"C:\Users\Admin\AppData\Local\Temp\dogec.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\kugavu.exe"C:\Users\Admin\AppData\Local\Temp\kugavu.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\jeheo.exe"C:\Users\Admin\AppData\Local\Temp\jeheo.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD547efd7d000ccb22ca65a5979c17d9e50
SHA1623a9a49394004626cf32720ea9dee58b678da85
SHA2566db58fb3e924f2bc22bbd50d53aa46b091f2f26eac23c6c5bd0679ff98b616e5
SHA51206eede9cdee20add184d5b6fec4c56015ba478d862175ca2726e27d483986b340cd242d9756f6cc90a4be3cd375c2a37cd676c895b46c197efd356e1f27b0faf
-
Filesize
340B
MD5f57ef2e2c519024a151ffdaac1a1f19b
SHA1eb306100a0537b24fc6738f21a49f5a67c12e364
SHA2566e1a6afc6fc6200d306b6a477dc1485a01d058c5ef9de8feb17f76965a7368be
SHA512594a11983ad8bfd6945c06a6150453cc89df720a25eeb5fc505a54c76eeff75f911b334e6ccf0dae796ac15e2985600afd9fac8676df13dbababfbda54b350b4
-
Filesize
784KB
MD5178bbe34e93e5044160abe561f6d07db
SHA1a60bc703698686149999de5484094c6fa356749a
SHA256937f677cefb4754f00b888eb8dee890fb3fec6f8637673ef54f6ffc96be81c06
SHA512e2216892913fefad7a7d47878e77004a54d0daa2f9fc261edb04067e8c2bb49827cf61e2e299ae707185f7935cc7bb8ebb7fb93da3bd4d5ffdf86479554a684b
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD50e0e3e999f242eb9109e9dd3addd34ad
SHA158861477fff0866a51e59bee2c50aa3b78b7dc80
SHA2562807236b3e1651fe27ab994356d4745c6fe552d7ae17fb4e8a2e7d119de8e40f
SHA512bc52f58245cfe721c53499100780a4f1096a35cc75923ec4c335860a1963ba8d524eaf7a66b997d3b3d95c9810597c5e07bae89f5fcdc4d62b27b9dbf194daac
-
Filesize
601KB
MD555099390c2b4143d46e0fffd98e50c02
SHA1ec8a230088145ade28a29669a375eaf22e5e4a68
SHA256bd598f77efa8dc94c33e158049379e3359555dbbea02ee78f34eda2b6c72c2d0
SHA51263ed167afc07b3d42440629c67c38b178fa5af50a12a8ffb92b4db87f00bc267b6aca29dde481c781b7b95d301f0ed06cb16d6bdd77e5e32baf8568cc05a087d