Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 00:11
Behavioral task
behavioral1
Sample
158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe
Resource
win7-20240903-en
General
-
Target
158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe
-
Size
633KB
-
MD5
ee07eb90a59c28a4fc93077c5c594070
-
SHA1
62dcfb3695ceb68f2da971da724c20abc87e51ab
-
SHA256
158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59
-
SHA512
7a9332da6b43709fa84955fe0dc37588dbf25d71b954b38425e0158243b0134c16b1b38712157f9933b10105ddb7efb77a8701ee990f37ed66c67a03abb304bb
-
SSDEEP
12288:5U7M5ijWh0XOW4sEf9OTijWh0XOW4sEfsd/:5UowYcOW4a2YcOW4s
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral2/files/0x0003000000000703-21.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation mixyp.exe -
Executes dropped EXE 2 IoCs
pid Process 4152 mixyp.exe 2148 xitod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mixyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xitod.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe 2148 xitod.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4152 3680 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe 82 PID 3680 wrote to memory of 4152 3680 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe 82 PID 3680 wrote to memory of 4152 3680 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe 82 PID 3680 wrote to memory of 3760 3680 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe 83 PID 3680 wrote to memory of 3760 3680 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe 83 PID 3680 wrote to memory of 3760 3680 158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe 83 PID 4152 wrote to memory of 2148 4152 mixyp.exe 94 PID 4152 wrote to memory of 2148 4152 mixyp.exe 94 PID 4152 wrote to memory of 2148 4152 mixyp.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe"C:\Users\Admin\AppData\Local\Temp\158dd8b3fe1809b172949ee4fcce6f0c3a896efee4b3b5236525f31c021f5a59N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\mixyp.exe"C:\Users\Admin\AppData\Local\Temp\mixyp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\xitod.exe"C:\Users\Admin\AppData\Local\Temp\xitod.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5d7ea169707b71490a67796d977ee26d0
SHA115048f219c9d584665e7031c0c24ed97e7cffefa
SHA256ad87c5660922c6c2de559c15b08323feb0986f6d553c72a0fa51e008e7fca9b5
SHA5121374280e95b319c9ff1cdfc27565accd6f7f31f415bbb85f6f0b6ab5a5fda518696ba8a281cb559c8fc1c25466fbf1a40a2d899725db1bf600f88f2c03dcbc1b
-
Filesize
512B
MD5d8fbb398f5d53a480a4ec5afefca40f0
SHA18852854ca1ddee401b836e06642a5745ebb46533
SHA256246c52da8fa0911a1fd7915c318b9505e62ee9213b71752d5d943adbec55d2c1
SHA512dbbc0c15a13bfdaf918dfc0766a849923354ca4750aecdb74cfb6acf2c3532702d743ce36b55b3f365ecf46e4f853b577c27e8c564965ecd589e1b50fa6781c9
-
Filesize
633KB
MD5bc1d2f402cdd2fb4a6591712abeafd87
SHA11e07f5cb2dd4a5bf1e6beec4b902567cdea14cb8
SHA2562ba432406ade8d42fc650b38c7f6a32771769a54552bd5bc1833361bb2f3afcf
SHA5120d8234a05a78477d2f869f1acf8b1d29c07a40f441c6cbe7b1a2a3bc38ae97b3506b26205709b1a48d635240c8d713f2b3f44956288f7feb1c0305baaf4b9b2f
-
Filesize
212KB
MD5694876d7f81a394a4cdd8a06747849d2
SHA175da5bb7ee28c78746894a5e01908bcce6fb36c1
SHA2561990cc6275a50bf177d9edc1f011db6eebd3b0e9eb63097b3d9eec83e6efb0e4
SHA512402cd54f0f520ed05836ee151ba18b8e2f7907f31b5b5adbcbe854a222b844b736fa57fe7e10222808254c30a89c42e6572fc11eeea410578272fe11239e090c