Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 16:51
Static task
static1
Behavioral task
behavioral1
Sample
0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe
Resource
win7-20240903-en
General
-
Target
0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe
-
Size
335KB
-
MD5
8cb4de3ec7aa600f32bda077dfa76d70
-
SHA1
a85ae20ee43c62b6db8c32c7409fbb424e5842d6
-
SHA256
0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807
-
SHA512
f111e57b24edbe8a93dacb9cc2fae513561b955895517730213d231cc7690817af0d069ded2a5aead25e5d7ab4a041ef20d7a2e31034632cad1350ab848cd6ef
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYC:vHW138/iXWlK885rKlGSekcj66cib
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation dutek.exe -
Executes dropped EXE 2 IoCs
pid Process 3768 dutek.exe 2872 xoqux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dutek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoqux.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe 2872 xoqux.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4064 wrote to memory of 3768 4064 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe 85 PID 4064 wrote to memory of 3768 4064 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe 85 PID 4064 wrote to memory of 3768 4064 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe 85 PID 4064 wrote to memory of 4828 4064 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe 86 PID 4064 wrote to memory of 4828 4064 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe 86 PID 4064 wrote to memory of 4828 4064 0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe 86 PID 3768 wrote to memory of 2872 3768 dutek.exe 107 PID 3768 wrote to memory of 2872 3768 dutek.exe 107 PID 3768 wrote to memory of 2872 3768 dutek.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe"C:\Users\Admin\AppData\Local\Temp\0e9b77ed79254116378600a4230410912ae913f7265890881554795c398ad807N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\dutek.exe"C:\Users\Admin\AppData\Local\Temp\dutek.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\xoqux.exe"C:\Users\Admin\AppData\Local\Temp\xoqux.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD58a3655a66124934fe99d94396b7b8feb
SHA137b47c752d7432384618d44f6898635a2807e1e2
SHA25627709208b3da2982a365e2434da68922716686268fd33791b549e7e609c67ca5
SHA512958dae655b5ea92e143d4e207d712235c8117093b47bb754c26fc4abfaef68273520b54ebb32a66af64de0a26e5b1baa78dcd6a494021edcc472152f0c4ba8fa
-
Filesize
335KB
MD5ec311ea398ed20ba702eaf31d8a53b94
SHA1acd8fa927808c06c335f611ce878cd2c98d90e9c
SHA256bcbf1f3b8222025c1bc4887d15e067e03b10352450a9cb4692c43d9d3dc441f3
SHA51269ee4fa9d07a895845ebce7aaa61bc1a8ee986ee674d273d521d6ab3182803b9ac2397f32310c367f1c864470cb6ea175629c19507ddc0ed5bffff46f324014d
-
Filesize
512B
MD532253532179537bc0f166d4770f7b4a6
SHA1d18a925561a0a600f03f61f6452c3cc59867fe4b
SHA256f2c30c9ebc5208a1cbb1d377c89b92611ebff7f9a6b5c6efd8df1835969ed478
SHA5122d0446839ce59aad51be93ba66f1c8007de82485c11ede7b4717b7f4b85ff5d0b3789c47d551a1c1dbe83f0646ae86c5fc4ca976bd11f4e5f04683ae9801a58e
-
Filesize
172KB
MD54574310ee0bb959d1b4adcda9420636c
SHA13b704ea119a4becf40f952b029d296bfa76de69f
SHA256f4368ba508a7a0bab272bafbcde0e31948c40b4510a05449aa73b739b9fe7bba
SHA5124e939ebd01d908a184ceaa4a7d64d01f25ab1bfb44a5cf8209683a0b89cb4ae83b5d5fad0c36583dd28a9cc0300466b3589e8391caea5fd75a3c305b148353e3