Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe
Resource
win7-20240903-en
General
-
Target
4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe
-
Size
336KB
-
MD5
362cea37b4515362a69bbdbf1114b700
-
SHA1
eea2d6bcf28637859873bb040eb63ca183aff830
-
SHA256
4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3
-
SHA512
e0a76b767f46ced49414b3ee0d9fb3faa746be5a0133bc06a474d7c5600b769390c1250f2605f514e993794f74ec71a6b7bc9808b48733d116c87576ab4d0ac7
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYvRA:vHW138/iXWlK885rKlGSekcj66ci2m
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation hefuf.exe -
Executes dropped EXE 2 IoCs
pid Process 4308 hefuf.exe 1476 jynes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hefuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jynes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe 1476 jynes.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 748 wrote to memory of 4308 748 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe 82 PID 748 wrote to memory of 4308 748 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe 82 PID 748 wrote to memory of 4308 748 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe 82 PID 748 wrote to memory of 5092 748 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe 83 PID 748 wrote to memory of 5092 748 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe 83 PID 748 wrote to memory of 5092 748 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe 83 PID 4308 wrote to memory of 1476 4308 hefuf.exe 94 PID 4308 wrote to memory of 1476 4308 hefuf.exe 94 PID 4308 wrote to memory of 1476 4308 hefuf.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe"C:\Users\Admin\AppData\Local\Temp\4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\hefuf.exe"C:\Users\Admin\AppData\Local\Temp\hefuf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\jynes.exe"C:\Users\Admin\AppData\Local\Temp\jynes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5476212ace4b11e6545bf385d85d0b5f5
SHA1801785d558f766f8e6b5646bf15ffe9f4ebc7e42
SHA256d7b50bf22f81a6c1cae7d766345a68bcb0ba8a85bd943beaf7300077a0e038ca
SHA5126ceee9e2aebc9cdc18328c5846060a823e58c6efff378bc84083f2e25569bdc5de5851833c95a51f09e854dfe51aadb356cdcf0457230987125adff322b5c01a
-
Filesize
512B
MD5d496d03aabe330076e1d9929cba54297
SHA12d135c8115e53c8dc5dd2cde6367f39e561a2505
SHA25664ac4844e1d1a5ad9d5a4101e9e6a2a3b79ca9f984e56fe7e2169dbe00c5171f
SHA51223f4ba9d0bc0dd4d2197c8745d863e7eef8bbc31a1d92ad3eebc3657e46d03269eee329bb86f08c69161d1d5ea864e0424c37092fdf75011018b8b72568333e1
-
Filesize
336KB
MD5d9c34b22fc4241256d4c621ab02d1b1d
SHA119100b4ece5e09382fd357ea6f9627e8cdb79bde
SHA256264c2f562ed63a28a29fc13875abb84d7fc920bc6aca7ce015609e849c0b262e
SHA512f10cd571db23f8efae820917945e53427ea7adc616e3fa93fa0410d8ee1bf91cdcb1f4d01dcc77f69fce285a349474258b7156d3d4e82613d4e0403fe06c24b8
-
Filesize
172KB
MD54f63a48f947ca504d147ecd09cd1bd65
SHA181bfb680ff67e4151966a322e7eedc7662c8ab3b
SHA256ca1e0dc52ca7df325e0f8ff932c5cf85fc22d2d1f0e9dd184fbfdcfd78d877b4
SHA512ee4f86309119d264a6d793786fc7db402be1fa99ebc54bfdc74c1fafad88df2ff7418fd41e52536cd1c1e74263f3014903104f048b3477b78e79037810158471