Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 05:37
Behavioral task
behavioral1
Sample
0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe
Resource
win7-20240903-en
General
-
Target
0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe
-
Size
404KB
-
MD5
17d6774357d1ed5cbe298a518e2c0cc0
-
SHA1
372a1facdf5eb371da9299e53626cbd50abeb982
-
SHA256
0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7
-
SHA512
3831174ef07e211504fa9e1c3af376f097d21077cc0ef12e56b458971872a7d8f79b70dc97de7ef51a8d400f799f77f6267e237dd581e4eeb517edfda40ff1c3
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohw:8IfBoDWoyFblU6hAJQnOa
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation miqii.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation gigaqe.exe -
Executes dropped EXE 3 IoCs
pid Process 2116 miqii.exe 1560 gigaqe.exe 3500 ewibb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewibb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miqii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gigaqe.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe 3500 ewibb.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3276 wrote to memory of 2116 3276 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe 83 PID 3276 wrote to memory of 2116 3276 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe 83 PID 3276 wrote to memory of 2116 3276 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe 83 PID 3276 wrote to memory of 4952 3276 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe 84 PID 3276 wrote to memory of 4952 3276 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe 84 PID 3276 wrote to memory of 4952 3276 0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe 84 PID 2116 wrote to memory of 1560 2116 miqii.exe 86 PID 2116 wrote to memory of 1560 2116 miqii.exe 86 PID 2116 wrote to memory of 1560 2116 miqii.exe 86 PID 1560 wrote to memory of 3500 1560 gigaqe.exe 103 PID 1560 wrote to memory of 3500 1560 gigaqe.exe 103 PID 1560 wrote to memory of 3500 1560 gigaqe.exe 103 PID 1560 wrote to memory of 1836 1560 gigaqe.exe 104 PID 1560 wrote to memory of 1836 1560 gigaqe.exe 104 PID 1560 wrote to memory of 1836 1560 gigaqe.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe"C:\Users\Admin\AppData\Local\Temp\0c3c08d11520de2f7fd47de88a6c137e0a50147a3f6218ab4f7e27602aff08d7N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\miqii.exe"C:\Users\Admin\AppData\Local\Temp\miqii.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\gigaqe.exe"C:\Users\Admin\AppData\Local\Temp\gigaqe.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\ewibb.exe"C:\Users\Admin\AppData\Local\Temp\ewibb.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1836
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5b2e941547929052bf4cfe0000bbf3c48
SHA17d5a631ba0c21213f403ba68613555ca0222410b
SHA256a98b9d3f7f65f69aca4da61f99d40f068a53df1c8e5fe5a3e8dae281e5ad511a
SHA5123c1507faeacd4ac2c6f74408cd9e117770cc126b1432fa563425a38ef5ab85c3f462706dc7cd78f2ec5f7140d781c728c517dd54ed31cf5e014af78e9559e749
-
Filesize
342B
MD57672dfff1d9098cb1bfdd60a543eabfe
SHA1edd393414659c3928c1415e10e462ac5d0ecae39
SHA25625085223409c9fb24bb274e0af46e67bb76ef493c7d0234b7870ef8d37da9e17
SHA512a388cfece0d17b1ffd54483111be34f542f9c0629adc2b82dc4cda85a0dd2f03779e2a659a61800b7d3ab0eef3bb7f4282238b9375c13a9bf54ea5b66b60d969
-
Filesize
223KB
MD5f808e357d5af90f886dd11acb621a8f6
SHA1c3555f8a9779868fb732ac4579d20bed9c417070
SHA256f9b8ef8b499385b4153931cf10feb4647a8df5db05a5bfd2c963958ca2b3bc1b
SHA512f9ebdf9ff62f38af416e14f3fc61453253e080c23f8e6071f0e01aad6293d75b639c6a3845c4be93602f0277b2a5e8a57d065ab536736fd29170e981adac1040
-
Filesize
404KB
MD535c89f12797cfa6a40267d0c62c9e423
SHA1d34dfe6b33c7075d0b29d113cd25fd3f95892e52
SHA256788147a4ef42be2c7b2be7ca6b8bac93030dbb09e789052faa8f8ad83e3a2b13
SHA5123fb7918801b29b7bbd40a5d86f5275b4960ce5cd363cc762a921616afbbc356babd172ac3987a89ad9efcfa1d3bd5bf6fe2449e35bb541830555ba662fba11fa
-
Filesize
512B
MD5ee5479ff69a78e539c56f8808b9589b6
SHA16bbe945055f5d479b6c6acfcde26dc2e24aa03f8
SHA2565b18138f4247bf091d3b0abbccdb42b15190585063be2b548039aa7d9a75fbec
SHA512f9a1b6274d513c316dd08cf38fa6deba1e00d1cee687e631ee734e21db9745d52784fea5252c027995d9382294af1bce14c7f8bf7720f1a8594af8814f6c1e29
-
Filesize
404KB
MD5ef01d50df1fe59fd1fdf75c21973e6bc
SHA17913f2f9dcef6a035ca60d5616f4607a2d2b3d2c
SHA256b1112b687d09805823f518bb61aa91b58f0da267b17ef9dfe243ca775d5c685a
SHA51210eb09e4f03c49cac46012410b3a23965543bd87a434a6725ee8932221a45de6399e91577809b4637908030d1635f789220ed808b4188affeb825607df126b57