Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 08:40
Static task
static1
Behavioral task
behavioral1
Sample
4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe
Resource
win7-20240903-en
General
-
Target
4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe
-
Size
336KB
-
MD5
362cea37b4515362a69bbdbf1114b700
-
SHA1
eea2d6bcf28637859873bb040eb63ca183aff830
-
SHA256
4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3
-
SHA512
e0a76b767f46ced49414b3ee0d9fb3faa746be5a0133bc06a474d7c5600b769390c1250f2605f514e993794f74ec71a6b7bc9808b48733d116c87576ab4d0ac7
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYvRA:vHW138/iXWlK885rKlGSekcj66ci2m
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qigeh.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe -
Executes dropped EXE 2 IoCs
pid Process 3064 qigeh.exe 3068 udrih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qigeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udrih.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe 3068 udrih.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4996 wrote to memory of 3064 4996 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe 82 PID 4996 wrote to memory of 3064 4996 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe 82 PID 4996 wrote to memory of 3064 4996 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe 82 PID 4996 wrote to memory of 3092 4996 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe 85 PID 4996 wrote to memory of 3092 4996 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe 85 PID 4996 wrote to memory of 3092 4996 4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe 85 PID 3064 wrote to memory of 3068 3064 qigeh.exe 94 PID 3064 wrote to memory of 3068 3064 qigeh.exe 94 PID 3064 wrote to memory of 3068 3064 qigeh.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe"C:\Users\Admin\AppData\Local\Temp\4882cc66f5fce7bfe19acd1b3c102d2f9e9f1dfa385873ffe87a0289d29876c3N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\qigeh.exe"C:\Users\Admin\AppData\Local\Temp\qigeh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\udrih.exe"C:\Users\Admin\AppData\Local\Temp\udrih.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5b56b74292202dfbed28d849479409787
SHA12b691f862fc8cc967d10f737afb5d453b849df61
SHA256965fca84d4a3d9fa5bbfd6401caea03e625f0c0accb2613ad485bd8226b05138
SHA512d272b35d23ac3d395c070d6c3589ae41caba9d50b443f8eb37bf44f550c8768cc11870e5df1ae9e867497247dad0367022977a01a847d2c620255ccd6fe647c2
-
Filesize
512B
MD512845c7d59c8740c49a7688a6adb3fac
SHA102fda1b4fe443454eb272ba975bc49e84f4d8d70
SHA2567ea2260b5093566b8ad017a16eb7b7fa3b9814a386d791220713e21c6731d667
SHA512a9334e207f48de7a5568339f884086d671d96528070d1ade1c291f93c699236e64dada5c6c84374d0a08cfbd1ea81cca1f3787ae74e7ad5a860be13e91d89016
-
Filesize
336KB
MD57b93288bb3561c938541631039280286
SHA1948a045fab00c3397d8292796e7b24bfd00a3121
SHA2565fc73250e6fbe63ea544bdd785360b5851a0c223934b8ab63caeb6c2d317ec88
SHA51276355fa9e98ca0f2945a745c8665815259756ef1a703d1ba99ae4262c908c96c8c76636704be52c55c345212d2f53b5c79c0adc25ba59f1d83901a477f270539
-
Filesize
172KB
MD51efa2665bf919e235ee17abc414334fc
SHA134282c4aff6e4a5a97a850650eb4280f9a12341f
SHA25620bd00c0faeae1de3c12845264ddcdff6462fc94785eb4f1ab5cc430817d7625
SHA5124596b96d1e2b6b7e13cb8e7e7c3c09f2d92794345e783a0a7c8262e1b25c3ded2a9e03e1a1698280ca9e704e3d6df15a0d565a08a22a2aa9b2d89b65df0a1b67