Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe
Resource
win7-20240903-en
General
-
Target
a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe
-
Size
336KB
-
MD5
b45c2b558660b3980a3d28bd0a3e5d3d
-
SHA1
83c94266393e4acbac9c18e91a650ae358a78f99
-
SHA256
a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4
-
SHA512
6f53de692a3fcbaa8146411787f6654f1d6b64ba239f18a6cd1e132a75a3950c64f229dbe8ef7716f002877032de7d903dd84b63bd1ea4bd0e7174420f3b4774
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYvRQ:vHW138/iXWlK885rKlGSekcj66ci2i
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation rymio.exe -
Executes dropped EXE 2 IoCs
pid Process 2200 rymio.exe 3024 baqyf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rymio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baqyf.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe 3024 baqyf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2200 1348 a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe 85 PID 1348 wrote to memory of 2200 1348 a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe 85 PID 1348 wrote to memory of 2200 1348 a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe 85 PID 1348 wrote to memory of 3752 1348 a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe 86 PID 1348 wrote to memory of 3752 1348 a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe 86 PID 1348 wrote to memory of 3752 1348 a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe 86 PID 2200 wrote to memory of 3024 2200 rymio.exe 105 PID 2200 wrote to memory of 3024 2200 rymio.exe 105 PID 2200 wrote to memory of 3024 2200 rymio.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe"C:\Users\Admin\AppData\Local\Temp\a5dcef05390011cec11500cf04cf823843f69f7bab0b0124d9ddf021d885daa4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\rymio.exe"C:\Users\Admin\AppData\Local\Temp\rymio.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\baqyf.exe"C:\Users\Admin\AppData\Local\Temp\baqyf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD58e0be38d08ee74b109930690d08106b8
SHA1329f116d83c325dc6acfa34e63e80c5801821f33
SHA256c9d35c975cb0708f48ca9a61ed3ac06d4a150ba71127206813d62e18f20a5ef2
SHA512774d9e0fa5768577a5ed33c607c50786474b794486e5094cac7d53e98014aa9cada813e0ec085d14e333f2acff85c5951d96d044f8551c7e2a17a4bd65b1b091
-
Filesize
172KB
MD58218a667a120b7ba24d4582517bc5c66
SHA17b7673392b7ef5f5c6f4332b28380ebc7618db8e
SHA256e1d5e827e71a3cea776bf40211b7a04fde2e7c680bc49d4b0aa90072f46beac7
SHA51288f5156c06eeeb967949fb479754cb579d926459bce2f8d08a9fddce23fd467da2a48f61ff0b1ead077ffd6f516e8ec7bd985ae8efce2af0ef82882ae6ef8024
-
Filesize
512B
MD569194b3dc80ccab1722cdc7d3e120ef7
SHA1a5029699a4aafcd26a586e7ca7e812edfef96c5f
SHA2565cae5052f7b4d19a5601878785df8ee47f36ca0c4e29e531e89fa3d6f8fa570c
SHA512cd295a885fcfe2fe67053e930d627172f66fd37968e235ae902526e91e0c3df4f5c2af9da2d8329e09fa4a793ab1084fd48491ea9e4e8ddf8296c8e73110f5e7
-
Filesize
336KB
MD513aa304ac3951c9ae33e1041511b9a07
SHA181a7f3e4036ade474bb26ba45bb69837b6f18d38
SHA256af01f48214b40fbb65bbb55afe4caf56f648840abb16fa30226037a94714498a
SHA51222c19daf036930aaeb6591cf2629257e5a607a81b4695d2303754340982f16feadee0af2a4cc8c7109cbbdab1669d946820af101977098905d8e9d78823f2592