Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 17:57
Behavioral task
behavioral1
Sample
a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe
Resource
win7-20240729-en
General
-
Target
a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe
-
Size
557KB
-
MD5
7fe3c05a108db999797fe06051691586
-
SHA1
2b44f9d07a02e336dc6c9742b064a21340cedc88
-
SHA256
a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280
-
SHA512
e95fb30851baba7b2076ddc18fcca1d63dbbb9c602082bab3c010073cdfeebe10a71c88c55601cbb84f175ac3a2f8d9ddbe7141c1b6ba208b8606ac33a24c471
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEyT:znPfQp9L3olqFT
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation liobo.exe -
Executes dropped EXE 2 IoCs
pid Process 1600 liobo.exe 1784 koqok.exe -
resource yara_rule behavioral2/memory/4012-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/files/0x000a000000023b78-6.dat upx behavioral2/memory/1600-11-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/4012-14-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1600-17-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1600-28-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liobo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koqok.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe 1784 koqok.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4012 wrote to memory of 1600 4012 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 83 PID 4012 wrote to memory of 1600 4012 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 83 PID 4012 wrote to memory of 1600 4012 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 83 PID 4012 wrote to memory of 4596 4012 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 84 PID 4012 wrote to memory of 4596 4012 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 84 PID 4012 wrote to memory of 4596 4012 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 84 PID 1600 wrote to memory of 1784 1600 liobo.exe 103 PID 1600 wrote to memory of 1784 1600 liobo.exe 103 PID 1600 wrote to memory of 1784 1600 liobo.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe"C:\Users\Admin\AppData\Local\Temp\a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\liobo.exe"C:\Users\Admin\AppData\Local\Temp\liobo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\koqok.exe"C:\Users\Admin\AppData\Local\Temp\koqok.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b3ce5c1b79472fa7760a9cc0061075e5
SHA1821a121ce2e23654efa7771d65fbe33bbf096eea
SHA256cd5eb434e04e6db59d9d7be262689599ae0217ee48a45483f347106eb6a9f005
SHA512184dc97c249581b992a5d81d819e8aeacd93b30f355afb2b32bbd2e4cbece549ecfab409261ecd2575659f2fa85340e7abf940e275a7c1b16bb2b8343345d009
-
Filesize
512B
MD550a06188f0a2d57808bfd39e4e262e5a
SHA1a747084b5ad1d30ce80480b496b1459956fbbe01
SHA256e09d87b32fa0f16a017a3cf41aa16173050631d158db3e0125298b8554fc262e
SHA512a8ceb6c6dfaba1e44dcf33c2bea2656258d605e0a8c80981dd8b5f6434b7ad6ffeeea2d8c550583a1eb321cdf03c803f1221510cbba9d69b11e0de0d6b48a2a6
-
Filesize
194KB
MD571607e9d7349d353d9ad9938de69c5c0
SHA1a0665696579c5c97a89319559bb42f8bae17587f
SHA2569b40d7c827468935b5e783ae7327ca3ed8d1179f42e31ccf0b29022c36d3b260
SHA512bd73b852a414970ae4711d895b0200b1b65195c6a16639a877cfaafa86ed3cf50961cc4a43fe3f62cebbbe19ea818fba056c9119c5d1ea53be692dc3da9b7553
-
Filesize
558KB
MD5195c538afe7cb6d06418747dd1350d0b
SHA16dd548df5cf3260b2db259b44fb6ab26c148ad94
SHA2561fcd2797719ad20fe2a0f092c2b6a73ab0d4cd8a20fedc46ebb1ba687fd394ea
SHA51236d7194e6d9b0fa9c5cbe14fb3bd89ea592b0cf664039b645395a0829d2056cec98f4321056ff1252e71dbd71fccc212a180bcebd10211898e69177bb57cafde