Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe
Resource
win7-20240903-en
General
-
Target
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe
-
Size
6.5MB
-
MD5
b02b00a0296a4ef74579e2c7b9c97de5
-
SHA1
efb2b78bf3c740b8e959ccb119e69016289c6209
-
SHA256
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0
-
SHA512
462343769bf21260b34a27dbb8151c25623dd181f78cd845d7258f2da135d38b1a019ebd34e45842c9449ac003984ca64902d69baf78e8234c7b0f19713115d7
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSi:i0LrA2kHKQHNk3og9unipQyOaOi
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation hiunto.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation hutai.exe -
Executes dropped EXE 3 IoCs
pid Process 4412 hutai.exe 368 hiunto.exe 2056 niipg.exe -
resource yara_rule behavioral2/files/0x0003000000000709-66.dat upx behavioral2/memory/2056-72-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/2056-77-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hutai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hiunto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niipg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 4412 hutai.exe 4412 hutai.exe 368 hiunto.exe 368 hiunto.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe 2056 niipg.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4412 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 83 PID 3492 wrote to memory of 4412 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 83 PID 3492 wrote to memory of 4412 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 83 PID 3492 wrote to memory of 3808 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 84 PID 3492 wrote to memory of 3808 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 84 PID 3492 wrote to memory of 3808 3492 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 84 PID 4412 wrote to memory of 368 4412 hutai.exe 86 PID 4412 wrote to memory of 368 4412 hutai.exe 86 PID 4412 wrote to memory of 368 4412 hutai.exe 86 PID 368 wrote to memory of 2056 368 hiunto.exe 103 PID 368 wrote to memory of 2056 368 hiunto.exe 103 PID 368 wrote to memory of 2056 368 hiunto.exe 103 PID 368 wrote to memory of 3260 368 hiunto.exe 104 PID 368 wrote to memory of 3260 368 hiunto.exe 104 PID 368 wrote to memory of 3260 368 hiunto.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe"C:\Users\Admin\AppData\Local\Temp\2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\hutai.exe"C:\Users\Admin\AppData\Local\Temp\hutai.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\hiunto.exe"C:\Users\Admin\AppData\Local\Temp\hiunto.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\niipg.exe"C:\Users\Admin\AppData\Local\Temp\niipg.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5282098bdc9beb730e3c63dedee02896d
SHA1fedc685b7b6ef60a285a1c4efa8f38594201fd67
SHA25630aada39f0b857d5fa3430f4f386771948d3016e179bd8dabfd6cff76b8d3b75
SHA5123c8269a979dfcdcbee307c8a9191ff7c8a086079e88c3bd3b4954ee3198ae076d97fe52e96525a25926eabf22453d46fa2aba9ab9b744cc67d3d5e27b3485e6f
-
Filesize
340B
MD5a4c3ec95e0a3ea35f1f5e1606b39f74a
SHA18433ce2f9a01ca5065e35d4029e69a04751df69c
SHA256b43823c0cc0568580d4c88db72a3252872a609446b0d4d2a5c9e48d587de3250
SHA512523f6e191417f267369f863539cf7bcbbc6d277508cd9fbc47a00891ada3934dbb8ad049b8fffd03b83c9846e60492450648d024f91acbbb30dcfc4174f309db
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD54b1c3191ee3cacc534b8c6c53da13623
SHA18593527d9739a2c7478ba3aa3e9385bdca548463
SHA25615cff8d5b8e5ffde0db150044c74d9d39105c3920e7beffd21af970f0a107d86
SHA5123849debd3c211bb0f05d206f3cc8e9c9e1e274c162ff776152df1f4a3956224ca56c0071c504ecbfb0ef2921d1b7c27228434f91bed0f09976ffa08964a12b9f
-
Filesize
6.5MB
MD52f444163cbcb387e409b680224e37a09
SHA14d2649e40f40a5f89f942bf2d0bf1ecc5b50cd19
SHA256bc7f042e861ce7d1aac2fd0ae745ff767adf3ac2503ebc09b10d0f79ec78dc60
SHA512f9978e4b4ca14e0bf36cac92b2ffb3f0cff47136fa6838bbf4776a3c40a50c24eed7cbd49483ca2cabe8481c0e94b5d8a3bd58d1ff01a34e3f12c6a98f116588
-
Filesize
459KB
MD55064ac6cf3dcb9da002251125e07dceb
SHA17e17b45bb1d1914ac6020e1c1b1675e15bfa4726
SHA2564172bda462ee98e17a158048ba1b88797b45004275ef887aedcac303db659bc2
SHA512f6f8d1ab95895530b11d76fa6131f381acc8e8ab80223086b4df0a9ed1a8faaa4b170f557ad92acb9626f8e0e4fbda77bacb520bbfe695516b889033c1e2ce18