Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 20:12
Behavioral task
behavioral1
Sample
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe
Resource
win7-20241010-en
General
-
Target
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe
-
Size
537KB
-
MD5
d20fee1a424647bee9f78e3942ba37f9
-
SHA1
a2c0bf2a4ce15eb5a151eadd37a1d51e9e87e3ac
-
SHA256
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757
-
SHA512
9bb9a502cee133b023d26d23e28a1037cb41f896e5c80e7e97f6e78eec42e53dceae1fa7600a9cd0bb9adb73b06f28be6442cb1eaada08de9afff8571a2b0e5f
-
SSDEEP
12288:q0nPhglq2Uyt4R/b2G/0hznQGoexBU/NPH:q0P/k4lb2wKatH
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation rivou.exe -
Executes dropped EXE 2 IoCs
pid Process 4744 rivou.exe 4912 fedoi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fedoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rivou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe 4912 fedoi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4744 4060 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 83 PID 4060 wrote to memory of 4744 4060 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 83 PID 4060 wrote to memory of 4744 4060 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 83 PID 4060 wrote to memory of 1492 4060 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 84 PID 4060 wrote to memory of 1492 4060 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 84 PID 4060 wrote to memory of 1492 4060 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 84 PID 4744 wrote to memory of 4912 4744 rivou.exe 102 PID 4744 wrote to memory of 4912 4744 rivou.exe 102 PID 4744 wrote to memory of 4912 4744 rivou.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe"C:\Users\Admin\AppData\Local\Temp\5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\rivou.exe"C:\Users\Admin\AppData\Local\Temp\rivou.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\fedoi.exe"C:\Users\Admin\AppData\Local\Temp\fedoi.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c2eb983e8ced9ab28290b9e78fa44f80
SHA1051ec107b9b7f56da21bd418b07489c414162000
SHA256ad3ec2686dea0acd066b44085130ef74ac8fc02ac49452d000045557bade23b8
SHA512df30a2c2b746442b37e4280e56605b0380a3f98bd0af45abb800f34cfd4fea33ace316131f1be74d0c1dcc720c29b4502d6a897a184ce9c89462b97d5a880332
-
Filesize
236KB
MD5a80b4797a75e88a791cfaa13d20d792f
SHA141cbbe99b8624e8c0b692b8bbb1f2b40f92708e6
SHA256c4abe72de406e880240c18648bba709bc61281b88d32b9dca3dbac1cb173fe2c
SHA51283cdfbd8fa9d99f3ebb7d997a3764c13e316a9bcbd301a4ad2b58dda818ed1a1563a4c7cbefeaebf0bedc81f5fd7313f4e09a3fa0d6f2d6e7a9d4f7f41cc9086
-
Filesize
512B
MD52efc1347429c374d77f629d944fda579
SHA1ae440ce57e206aca101a3e957aa80f426a16a17c
SHA256dfce0c03be59549aa978a1c53d2311d0c6c537ad96455fe2a714e3efe6a1d92c
SHA512a66785a17c3e51af5846fb6dbddde586080c973dab0bd12d9c10e30859e97fbfafcaa8aa9d560aa6af1e8290767b41cfe93f39ad7592b9b1406894bd8ee69635
-
Filesize
537KB
MD556bf5215bf932ec1416cf00ea338a38e
SHA1366bbbbd2112c352ed7ae77f32175acb7de2808a
SHA2563dd5887b15e07ee381a0a91c4917bbc458f9633fb746445e1ad7dcf16db120d7
SHA5120c3632906179e1ff859c20bc181386132d30669b2835d8632cccd1cc6eedc5e2df5354fc9f07aa6169d96cee5a22870c8241a45343f4f8a6d7b789c0d15cdc70