Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 19:17
Behavioral task
behavioral1
Sample
054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe
Resource
win7-20240903-en
General
-
Target
054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe
-
Size
506KB
-
MD5
abebef90eeaca5e12766b4b318c379a2
-
SHA1
614d5dbf8251213c64072690449fb18b91e2cf52
-
SHA256
054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522
-
SHA512
da2da22f747c00f0e6d6c2cb9f604576455ae7c6be72010b51d8400d2702a05eb08f1499f0231c6ea0d557b54557bd8178e948abd381a162219d0dc30c65d1f3
-
SSDEEP
12288:ndBNKTCqqwXCcdgT89+MvA+BisqYpxHtp:nLjQC+fs0j
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation luovt.exe -
Executes dropped EXE 2 IoCs
pid Process 2416 luovt.exe 4472 lelyy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lelyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luovt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe 4472 lelyy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4368 wrote to memory of 2416 4368 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe 84 PID 4368 wrote to memory of 2416 4368 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe 84 PID 4368 wrote to memory of 2416 4368 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe 84 PID 4368 wrote to memory of 964 4368 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe 86 PID 4368 wrote to memory of 964 4368 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe 86 PID 4368 wrote to memory of 964 4368 054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe 86 PID 2416 wrote to memory of 4472 2416 luovt.exe 106 PID 2416 wrote to memory of 4472 2416 luovt.exe 106 PID 2416 wrote to memory of 4472 2416 luovt.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe"C:\Users\Admin\AppData\Local\Temp\054783035cbfa181bdaf3da8fb9cc69704662dedad83519fe111d102440cc522.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\luovt.exe"C:\Users\Admin\AppData\Local\Temp\luovt.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\lelyy.exe"C:\Users\Admin\AppData\Local\Temp\lelyy.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD53ed292fae746cd695b4bc6f47cb20942
SHA1b8cb83ddfa3678cafb559ca3acec62ec9edcb763
SHA256d6afa59f628fbed274d3df486bf09db1b24332800f823336b2d505299878b607
SHA51208122b34d6002c73e01a0ebe7030d1a7f90b11c1cfb3f9711e61413f32819a4ea6aed5debbae6643764c5f3fadae329261a912b954e88965d9ec1725a665387b
-
Filesize
512B
MD53d02ba4b8ce81c0017cdc5007f849684
SHA10be38da5c3fbab1e540a37ffbd90d3871e43c96a
SHA2567e6c4c727ebcd4a9e8b5ee6c25f01804de97000ef31ce1c1bf583177a76f75f5
SHA5123e81820ec53ef5dcf4138ee604a909fd8c150c03aa4e4456992b57ca7585e937acc4a1b61bb0eb63b74f918589002e19aad1fc3a6d06a6c65889881b6d1e487c
-
Filesize
241KB
MD5ea7e6d485c0a4afe58773c50e08f8e85
SHA1f2cd226460692d6d5514019e730c66f7cf38d433
SHA256f1b5584d453b345372cf52ba5195579dcc130a4c466131854ce25865fafaec10
SHA51232a5bcd1cc33d3ecf520e53a74038b861541096a4361adb8d3d8131d2d3988fd99d0bea8f9be1b03d0dfdbd5e15042e3f427724bf881ebd030aca73edf711485
-
Filesize
506KB
MD5adaea7f9b0181e4865418fede5d50971
SHA1c2bc8601d7423deca075d8e13ffb6279367dd023
SHA256a0165a1069a2622b2b73a2cc6cc6be7c760c9ca56b3bc8ba4abf0f32167452fb
SHA512ec57483fcb2bdccd51b314f18d5880e737ecf741898028bc24401bef3af7c7b02b14e837a28a819efac85f27bfa9bbdd5a2cfc36f09d5848809c5c2b0058f819