Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe
Resource
win7-20240903-en
General
-
Target
a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe
-
Size
271KB
-
MD5
8dcf36dbac7541e903b39079c481783f
-
SHA1
4da3e2ba8433500f27405fa79d4c55a7331d4506
-
SHA256
a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558
-
SHA512
7ee072cf3b38e8322584516e0909b4cc534f5ab6bcee68c364230b0dd7cbf586c83c319089f393936f5af0860f2e35e3b43f41c6e2709c31228896ab38fc2ec4
-
SSDEEP
6144:SPdhP7Vq2S8GYlH9LKeu5exdoW7KkYGuH6lY:uhPjSCKeu0oEYGTW
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation fulol.exe -
Executes dropped EXE 2 IoCs
pid Process 4532 fulol.exe 2304 numyf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fulol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language numyf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe 2304 numyf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4532 2648 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 83 PID 2648 wrote to memory of 4532 2648 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 83 PID 2648 wrote to memory of 4532 2648 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 83 PID 2648 wrote to memory of 1108 2648 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 84 PID 2648 wrote to memory of 1108 2648 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 84 PID 2648 wrote to memory of 1108 2648 a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe 84 PID 4532 wrote to memory of 2304 4532 fulol.exe 102 PID 4532 wrote to memory of 2304 4532 fulol.exe 102 PID 4532 wrote to memory of 2304 4532 fulol.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe"C:\Users\Admin\AppData\Local\Temp\a53e69fb084d3b220c7dd6e903fa48484833f303f4590adbdbc869f25424b558.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\fulol.exe"C:\Users\Admin\AppData\Local\Temp\fulol.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\numyf.exe"C:\Users\Admin\AppData\Local\Temp\numyf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5708d4cab483a659dedbb37738fb4ea21
SHA1dba1910f9df879daf0939d0bcf18ff430c8020af
SHA256a918b58f9417c9b57405dc592be62246050dc940b8ddd8861510844b1f6a3d07
SHA5126832aba9774eb549d59a9055888d403d1c15a2c9b6ab989f7040bc2e599732fc17f20f9b0481ad91ef612cebf64f45902a8352a4b3a7309bbe9565eac3ce1c3e
-
Filesize
271KB
MD59fe51066b2a6e2c2e73720fafc29b59a
SHA162b4c575fb7e39807edfe8774e4af7beb3b5d1b9
SHA256249ebb071ece795c73bd5e255d96d444a2ac64a24865c1a8b1e086adfa17cd8b
SHA512dc896cbbdb14fc6918de88e8e93153d6c427f8147afa1a75358b43cd74e0015470186d2e934c3e71e7aca1b36784de7d3babb2f110c03d86650d2230ecd48585
-
Filesize
512B
MD51284493edc1a8eb28798cab1b32d47a7
SHA184a86fa80d3eec0227e5a834c90af827274f8b6a
SHA256e919116fbdfe83e04bf3c8bebbae5a7b1e77f712dd58a0b11628f4d1a2bbf3ab
SHA5120a63d9ffc4dbd8d4cdca9aa662f4c77cc2c5310100151fe7b993edfcfdb6e9e153089bdae7748a1884d0062872d14adb06cc2231a99f7cfb784c65aebd273294
-
Filesize
291KB
MD51201b3b5f3057dceba33988ba0e7bcf8
SHA1ba0a8d06e0c7138acf809186daae7af55e51053b
SHA256f95e4c20fd472ab6904e4a876ae80491405d41b16054a396bb48231fe7c41e5a
SHA512ff297be9d65093c623fba2b040e425fcd595fb2fc0cf2cc7ec2966285e6e280ee77848fcba826881d99a0571fa5584598eb1b4db48faa5f9515ca036cefc0175