Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 06:47
Behavioral task
behavioral1
Sample
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe
Resource
win7-20241010-en
General
-
Target
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe
-
Size
348KB
-
MD5
93db11bb283279a3d520050cf0ef426e
-
SHA1
f98cb13e6c10407f866ebbc9cb41cac31a293485
-
SHA256
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347
-
SHA512
928217623428c6c85b86872ed5853faa07c0ffbbce829a1f17bf34aec3a47bc85f7557decf95d8d8f591bb3d919720cf1669a1e429750d2b52ba13fbe16ec463
-
SSDEEP
6144:c/bE5G5KiR0J0dCsnGb/6VOpLc91WlvhDSNZR:A0G5obGGraOpUWlpq
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
sezos.exeuztuby.exe3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation sezos.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation uztuby.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe -
Executes dropped EXE 3 IoCs
Processes:
sezos.exeuztuby.exedorun.exepid Process 3616 sezos.exe 5024 uztuby.exe 2068 dorun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exesezos.execmd.exeuztuby.exedorun.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sezos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uztuby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dorun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dorun.exepid Process 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe 2068 dorun.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exesezos.exeuztuby.exedescription pid Process procid_target PID 2324 wrote to memory of 3616 2324 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 83 PID 2324 wrote to memory of 3616 2324 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 83 PID 2324 wrote to memory of 3616 2324 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 83 PID 2324 wrote to memory of 1516 2324 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 84 PID 2324 wrote to memory of 1516 2324 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 84 PID 2324 wrote to memory of 1516 2324 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 84 PID 3616 wrote to memory of 5024 3616 sezos.exe 86 PID 3616 wrote to memory of 5024 3616 sezos.exe 86 PID 3616 wrote to memory of 5024 3616 sezos.exe 86 PID 5024 wrote to memory of 2068 5024 uztuby.exe 104 PID 5024 wrote to memory of 2068 5024 uztuby.exe 104 PID 5024 wrote to memory of 2068 5024 uztuby.exe 104 PID 5024 wrote to memory of 1732 5024 uztuby.exe 105 PID 5024 wrote to memory of 1732 5024 uztuby.exe 105 PID 5024 wrote to memory of 1732 5024 uztuby.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe"C:\Users\Admin\AppData\Local\Temp\3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\sezos.exe"C:\Users\Admin\AppData\Local\Temp\sezos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\uztuby.exe"C:\Users\Admin\AppData\Local\Temp\uztuby.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\dorun.exe"C:\Users\Admin\AppData\Local\Temp\dorun.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD501032fe93edbb670906c3a1e81cb6754
SHA170e3cb04c5ddcd1b5686e850d162f6b0e0466f3a
SHA256d1851dd24016c00c74131e10200b0c01de08976e36db89d1a0f41e12c77831c6
SHA51225607d3341662dfa4a84231a543e78d2652b4d48cf0320857b5c58d59e480551e197d70c569f12b1d12e02d46fabe6009849d1bc90d325fe7dd60113bd4e3060
-
Filesize
340B
MD5eab8cdeb2432c313cf894fecaa61891f
SHA118c946de296176c12a253b09782244d0b32743ee
SHA25604f87133dcb9c056a48337e2a1805bf605e6fb57116d90520d2193594f93b2bd
SHA5126b806a2e34affbfca2a36bb6d3c7a01d18730feb3e2adef2c91cbe19037d015142076e342aa62299756cd65d8a844cf8c120e0e66c7f90df9fb78d3afb9dadf6
-
Filesize
115KB
MD570b484b8f36943fb214f63032a8d4722
SHA1e92e1b92426744709944e9d263787e18753a2fcc
SHA25680dd790620f8ae211765827d47f290ade3235bef09034cd3a01a91540fc0cc72
SHA512b0b40c9b72ad4aa58c1506a8485c4099a7a91b1df5196c95849eb26112f20a395a5c4461333d6a7dbf6d6eab77d33086c76d2f9ac1e943a23ac2c9f72d1b4797
-
Filesize
512B
MD5547b0ccc1a9f6b138bf242cea0bdc5c9
SHA147dc41be6a9df99a1a8a048ff85cf926423559f7
SHA25641b34ae5e35ffe7450edcf281f98b80035aa2a0f20ec2fbbc21b249d926b0ff0
SHA512fa9a9e0880795105ecddb9f7271a2664f9d042acdec0fd0cd2c289396df27437e96d770bb73a76009efda196bb04876b0d454d3b4c9ee13532286002092e3703
-
Filesize
349KB
MD5802865f0a171adea558317643097bb49
SHA18c667eb15ab45ac98442642741791e8bab7daf99
SHA2561358b66fb9a596b1215b987174ff36fdf6abf0db24388e4a9a3cc7fcea31feec
SHA5126a3e0f136cc70a8b4d717629a3cbd129d25baa820056480b010df50b8bbd401366f75580476be18d47fe6dff964471a83795bf1fdc1cb4e2ec3f1cd1563af60d