Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe
Resource
win7-20241010-en
General
-
Target
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe
-
Size
6.5MB
-
MD5
b02b00a0296a4ef74579e2c7b9c97de5
-
SHA1
efb2b78bf3c740b8e959ccb119e69016289c6209
-
SHA256
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0
-
SHA512
462343769bf21260b34a27dbb8151c25623dd181f78cd845d7258f2da135d38b1a019ebd34e45842c9449ac003984ca64902d69baf78e8234c7b0f19713115d7
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSi:i0LrA2kHKQHNk3og9unipQyOaOi
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ifzabi.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation xitaq.exe -
Executes dropped EXE 3 IoCs
pid Process 4796 xitaq.exe 2664 ifzabi.exe 1604 vajop.exe -
resource yara_rule behavioral2/files/0x0003000000000709-64.dat upx behavioral2/memory/1604-70-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral2/memory/1604-75-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vajop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xitaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifzabi.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 4796 xitaq.exe 4796 xitaq.exe 2664 ifzabi.exe 2664 ifzabi.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe 1604 vajop.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4796 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 83 PID 2288 wrote to memory of 4796 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 83 PID 2288 wrote to memory of 4796 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 83 PID 2288 wrote to memory of 2224 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 84 PID 2288 wrote to memory of 2224 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 84 PID 2288 wrote to memory of 2224 2288 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 84 PID 4796 wrote to memory of 2664 4796 xitaq.exe 86 PID 4796 wrote to memory of 2664 4796 xitaq.exe 86 PID 4796 wrote to memory of 2664 4796 xitaq.exe 86 PID 2664 wrote to memory of 1604 2664 ifzabi.exe 101 PID 2664 wrote to memory of 1604 2664 ifzabi.exe 101 PID 2664 wrote to memory of 1604 2664 ifzabi.exe 101 PID 2664 wrote to memory of 3160 2664 ifzabi.exe 102 PID 2664 wrote to memory of 3160 2664 ifzabi.exe 102 PID 2664 wrote to memory of 3160 2664 ifzabi.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe"C:\Users\Admin\AppData\Local\Temp\2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\xitaq.exe"C:\Users\Admin\AppData\Local\Temp\xitaq.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\ifzabi.exe"C:\Users\Admin\AppData\Local\Temp\ifzabi.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\vajop.exe"C:\Users\Admin\AppData\Local\Temp\vajop.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD59d1ce865ac5a4ee8818bdf90db1e4331
SHA19f2cf508b22b4ff9a9a6a4b4f56c40e82be17d80
SHA256938aa119df4f7ad6bfc262d3b4465b46c2b33f9e70175ea90ebc344be982eadc
SHA5121d8c1a05385613efd665535f6901a1c0c390117f65577b2e0227853e09e63d3a699905331de97da3172da27c1e357f9cf3404e7ab49aa4b74f9f9c5d87b68f7a
-
Filesize
340B
MD5a4c3ec95e0a3ea35f1f5e1606b39f74a
SHA18433ce2f9a01ca5065e35d4029e69a04751df69c
SHA256b43823c0cc0568580d4c88db72a3252872a609446b0d4d2a5c9e48d587de3250
SHA512523f6e191417f267369f863539cf7bcbbc6d277508cd9fbc47a00891ada3934dbb8ad049b8fffd03b83c9846e60492450648d024f91acbbb30dcfc4174f309db
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5ad41a021bfbbfdcc4853cbc60465abae
SHA1053e68891ae06f04787863511f0a60fabe2925e4
SHA25646ca682c946b3f048f5e6c6e4817fcebf372a21caf53272bc2eca02d600de1fe
SHA512af63c1744215a88e808384f4d972ed00555790b6d8735e63854c56b90eebcbd1cc45e487680d6072748cdcf22794b5eb010641485ec3427f51d9995a3e7805a4
-
Filesize
459KB
MD5dbeff7621eb4c185811b60436037fa52
SHA1dd1f5f9f601d0a2fcae1aa68d4b0f12b25e4ebd7
SHA256c6b27e4f0ec8e8d652f929c874ce5b6fe22efc773268c26a9f6708cbd1b1d17e
SHA51239d11f6995a8adb7de152aa538c07b3907d1ab5780ac2a08bfd24ca2547b6f4127876eab7eadc0dee92316ba1e6255fc339cbb34f310bcde402edf675fd13ee2
-
Filesize
6.5MB
MD5246c4359e16a29f22b3a2ed0b9cd6ba2
SHA124c8788d257f852cc379e2a4cca5118c0613e7c8
SHA2560e60a24702abd39892acc555285bc5b067f19cd7b99a9177506a1972b363b747
SHA51242bd86e166fac3d62204a5959c54f292fec726e95608a6b9c0c3714f072c02db03939edf57784c5e163c9da5d174ecb202d9ebef83972387f0ab2bea20f35d8a