Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 10:15
Static task
static1
Behavioral task
behavioral1
Sample
cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe
Resource
win7-20240903-en
General
-
Target
cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe
-
Size
442KB
-
MD5
fa6e8dd182cec92f3ed6ff7927eaf628
-
SHA1
612b64625bc72df8ac25d7163b45650647715832
-
SHA256
cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d
-
SHA512
885189e84e84e0bfe5f435678af9aeb43a7903ebd5fa44abca16f16adff3f9fa95850df8636c39e56e2751474872fde16ab14a503166b09bdda02f44b7c3b8c3
-
SSDEEP
12288:W33Xn66ga6ENOy+CDyepaccTCSjfkkItQU8eoPr:8Hn6/8NOy+CDQcciQpeoPr
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation uwkis.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe -
Executes dropped EXE 2 IoCs
pid Process 1520 uwkis.exe 2388 gyada.exe -
resource yara_rule behavioral2/files/0x0003000000000709-33.dat upx behavioral2/memory/2388-37-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2388-41-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2388-42-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2388-43-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2388-44-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2388-45-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2388-46-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyada.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwkis.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe 2388 gyada.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe Token: SeIncBasePriorityPrivilege 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe Token: 33 1520 uwkis.exe Token: SeIncBasePriorityPrivilege 1520 uwkis.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1520 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe 85 PID 1168 wrote to memory of 1520 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe 85 PID 1168 wrote to memory of 1520 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe 85 PID 1168 wrote to memory of 3068 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe 86 PID 1168 wrote to memory of 3068 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe 86 PID 1168 wrote to memory of 3068 1168 cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe 86 PID 1520 wrote to memory of 2388 1520 uwkis.exe 106 PID 1520 wrote to memory of 2388 1520 uwkis.exe 106 PID 1520 wrote to memory of 2388 1520 uwkis.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe"C:\Users\Admin\AppData\Local\Temp\cc9cd80e3af0e7ae8d3670fd05d6b8f5ae247cf823d3d5554fd56a1f19815d4d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\uwkis.exe"C:\Users\Admin\AppData\Local\Temp\uwkis.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\gyada.exe"C:\Users\Admin\AppData\Local\Temp\gyada.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56a7c84720548deff10f32c474b9a4845
SHA1c3d2a47a81104e0960558d134b72b9d9aa4fa546
SHA2564429ab7fac25beea789a89d68e2d73d697565d54aaa797abbce6b2038735c601
SHA5121805e4f0fac1f05b8534fdae77c00fdc41845596364c4544cbde2eaadaa333b24249f8cd50c5cf693639b10171b3d5bd0acf2b91499fad7e26966a3c129db3b9
-
Filesize
512B
MD5d85b3c0309689ed4ff54eaae001f1028
SHA13514caa1e5589f2134e3081d4927b12d243b7a95
SHA256846b23926e6feb406ee989b5b5a41fba9aea2f978457c6e8fe3b9db219fe5cdf
SHA512b28159d4dee80f3374c8f47e96e2d1c74ee407173257d2e4002d47f2f9bde283a4bd3decfad563ddd684c6b210dea605d4afde7533050e58665a375651354e23
-
Filesize
198KB
MD5b3a404a00db9a68c0af1fcc774303866
SHA12be23defd7ea782fe1fcbb7db8ccef5c6ee0e71e
SHA2565332dbcac74d0a11f320bc104ddc89d97dac8d85de28491a4aea6149411d578e
SHA51290f2940e56b7cc1511fda7965431bb356524e64a4f1dcc048c4c9cdf600737ac7dd9fa754ffdf92e8a367bc3bcd40758c6cc9aa77a30175c18c5b9d78c92c1c0
-
Filesize
442KB
MD55db902259f8117e5b8ebb432291acd65
SHA1b9151a3bcec27d0826381b4074fcc6f09dd4ed92
SHA256231ff8a67be3d969bcdd2489fdbb6fa58c52d79ce23d5d1d47086fabfe2c013d
SHA512c2698c4514a053e1ee5bd45766afdfb847927f5b1d61a5173fc493e0dcc3dbf4067d415a2fef84406c7c5c2b858450acc9df1a324c8b20cd477887ccb9c169f6