Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe
Resource
win7-20241010-en
General
-
Target
a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe
-
Size
271KB
-
MD5
8dcf36dbac7541e903b39079c481783f
-
SHA1
4da3e2ba8433500f27405fa79d4c55a7331d4506
-
SHA256
a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558
-
SHA512
7ee072cf3b38e8322584516e0909b4cc534f5ab6bcee68c364230b0dd7cbf586c83c319089f393936f5af0860f2e35e3b43f41c6e2709c31228896ab38fc2ec4
-
SSDEEP
6144:SPdhP7Vq2S8GYlH9LKeu5exdoW7KkYGuH6lY:uhPjSCKeu0oEYGTW
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation omcoh.exe -
Executes dropped EXE 2 IoCs
pid Process 2880 omcoh.exe 4816 uzdos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omcoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzdos.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe 4816 uzdos.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2880 2196 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 83 PID 2196 wrote to memory of 2880 2196 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 83 PID 2196 wrote to memory of 2880 2196 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 83 PID 2196 wrote to memory of 3236 2196 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 84 PID 2196 wrote to memory of 3236 2196 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 84 PID 2196 wrote to memory of 3236 2196 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 84 PID 2880 wrote to memory of 4816 2880 omcoh.exe 103 PID 2880 wrote to memory of 4816 2880 omcoh.exe 103 PID 2880 wrote to memory of 4816 2880 omcoh.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe"C:\Users\Admin\AppData\Local\Temp\a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\omcoh.exe"C:\Users\Admin\AppData\Local\Temp\omcoh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\uzdos.exe"C:\Users\Admin\AppData\Local\Temp\uzdos.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5708d4cab483a659dedbb37738fb4ea21
SHA1dba1910f9df879daf0939d0bcf18ff430c8020af
SHA256a918b58f9417c9b57405dc592be62246050dc940b8ddd8861510844b1f6a3d07
SHA5126832aba9774eb549d59a9055888d403d1c15a2c9b6ab989f7040bc2e599732fc17f20f9b0481ad91ef612cebf64f45902a8352a4b3a7309bbe9565eac3ce1c3e
-
Filesize
512B
MD5fb0becc6c75cd25a5fdaaab7403afc9f
SHA175341fcbfa57b376634887f4c508680691fda780
SHA2567208653770122c55a20d50edbfa536924d92e361e783b729d5de5884fd95981b
SHA51224ad8d63bc396d83e4c37b621e03e079add2978033cf12f8b0bed766acc3dcc9907960e647814f3a929c5bd0aaed13bc321513b8a0160038944c6e28a57efaa7
-
Filesize
271KB
MD5d602f19f1d9a6ef8db80f41a3fc038e8
SHA1791027fd8393718a6c7f700c2ca4d4a7b27b4083
SHA2569e337ef8bcc5e3f8d4e2a021358ce3ac70ccc2258402f6671692995720827601
SHA51249918090fff81bd9c4ed2ada1853e4bdf8ff7ad04d2332ffe6d423c4f0bcd8bd5c5cc937dcc8cc824f26c93287ee11a6238745ef5155aa72226bfe11538d79b8
-
Filesize
291KB
MD5bc0b8385c731ac49fb0e36585013b894
SHA1c7dc1ff21f54f5d5d7f665ba23c0c3a9f7255b66
SHA2567bac99135e66a5529b5fb096c574fa5f9614813f7d09651e56c90c40fbc701e1
SHA512f03d453fa1410883197cd3e6a8ccaa58aff1a1064343b15f5da561faf9c8fac2520d7f2ea7bb8e00db1904123b14939aa8f439a363aeffdfffe169ffbc8c4985