Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 10:32
Behavioral task
behavioral1
Sample
f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe
Resource
win7-20240903-en
General
-
Target
f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe
-
Size
641KB
-
MD5
d61f155a04d2b2801f8219bca8fbab10
-
SHA1
3d93ba284f59854a7a05dd59d10f17ac02807618
-
SHA256
f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afce
-
SHA512
869266800d97e573c8a48a55ad212bdc16cc216f180c52ce19c6799ac162475b0900d4179cb55985190914383bbfbb82ddfe1bf3e6c48459607edc547eb66495
-
SSDEEP
12288:jBjUUmQfHYO+2LI5++CHYq6gCop2KQU1TUNW7q5m:jBvmcYO+2s59QP61KQQUNWp
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ivfor.exe -
Executes dropped EXE 2 IoCs
pid Process 2864 ivfor.exe 4716 voicv.exe -
resource yara_rule behavioral2/files/0x0003000000000709-21.dat upx behavioral2/memory/4716-25-0x0000000000400000-0x00000000004A7000-memory.dmp upx behavioral2/memory/4716-28-0x0000000000400000-0x00000000004A7000-memory.dmp upx behavioral2/memory/4716-29-0x0000000000400000-0x00000000004A7000-memory.dmp upx behavioral2/memory/4716-30-0x0000000000400000-0x00000000004A7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voicv.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe 4716 voicv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3344 wrote to memory of 2864 3344 f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe 83 PID 3344 wrote to memory of 2864 3344 f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe 83 PID 3344 wrote to memory of 2864 3344 f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe 83 PID 3344 wrote to memory of 1200 3344 f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe 84 PID 3344 wrote to memory of 1200 3344 f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe 84 PID 3344 wrote to memory of 1200 3344 f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe 84 PID 2864 wrote to memory of 4716 2864 ivfor.exe 103 PID 2864 wrote to memory of 4716 2864 ivfor.exe 103 PID 2864 wrote to memory of 4716 2864 ivfor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe"C:\Users\Admin\AppData\Local\Temp\f05b2d0a90ba1df0734cb30a4fc76309ddcfd39ab40338ec3b9d1cd99a43afceN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\ivfor.exe"C:\Users\Admin\AppData\Local\Temp\ivfor.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\voicv.exe"C:\Users\Admin\AppData\Local\Temp\voicv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5a413fca0087c440ff5e62e80c3a3865a
SHA1335856923bf4f6f7e86cef18d481f532498961c4
SHA256621c837caddbdd7068a561e26be6c2837dbad1d4811a029d7ee95d70e37cee90
SHA512282df54001e9f733099eaff6cd5089f3238d600a5c53b502a926dccc0422c231c5e3d3e17fed2a93fff6aeec5908dfaa7aa748f71ffe916317899f2913b68f75
-
Filesize
512B
MD51f7d38779617b323a75f9d168a721044
SHA1ad0ceed2ac7c596fe52c98e6be5017637aec10a8
SHA256fa6b2540284bfed86d61553346b23c7ed55bb49dfbca71393b8857a1a318a81b
SHA5125f5808f8e7821c31f78a5ebf117c0e0493e3b28521427bff3c46c0ca34dd2007023b8779249bf0cba505ddb1031da7532652470683b3211a5d1372384a7cab59
-
Filesize
641KB
MD56e4310376b3d965489c40d3b4fbcd40b
SHA1d2e846e8f458cc8fef666c71d586ac9541ef3249
SHA25696e6ac7ec5875e589a8a6f651016a59031762e548909bd01d26aa1eb555ef917
SHA512653922f4c8c631b9dbe7f481ae315344629758412fdb380c5f5ce1bd0b67622ac41b87d591554e2002139b5824ce7dd9cd2de0bbbe8c5ee24cb429d1c6b68949
-
Filesize
205KB
MD51d473c0fdc08c644719673cb059d4901
SHA1a7ba80000fa78ff4a63599d8036e520c7bc021f3
SHA25698455839f7f6d4d780a9d5f0ad171117d4f975ff3028733637f4d9d753026b7a
SHA5120ca26f2d6927710e9d67777d487071036a31152810d22af15d86c90cf7b4cbde633f8e58354603ca0e0b2d936d8fd56eced3195082e239e7568cbc7031326850