Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 23:44
Behavioral task
behavioral1
Sample
0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe
Resource
win7-20240903-en
General
-
Target
0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe
-
Size
593KB
-
MD5
9474fecc38dce4cd41032608f2ceb528
-
SHA1
8f5ab9143beadf50ac100f9acc972b255f668055
-
SHA256
0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3
-
SHA512
db95e17a11b74ee77a8ab15118a39ed677e84d8456c0b2a051592a6428a543ef611abed3c48c975c222332f53b86338080c95b8cec0eca1746cd576dadfdefa6
-
SSDEEP
6144:CZKHKSIl0SatLPTUrjBpAs/mpYIqaaUN44Iq766ztAkOHn0LHZRF:C4jm0Sat7Az/gZvTIq2WKkw0FT
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cicuo.exe -
Executes dropped EXE 2 IoCs
pid Process 1700 cicuo.exe 1128 yqdor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cicuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqdor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe 1128 yqdor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3416 wrote to memory of 1700 3416 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe 84 PID 3416 wrote to memory of 1700 3416 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe 84 PID 3416 wrote to memory of 1700 3416 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe 84 PID 3416 wrote to memory of 3944 3416 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe 85 PID 3416 wrote to memory of 3944 3416 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe 85 PID 3416 wrote to memory of 3944 3416 0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe 85 PID 1700 wrote to memory of 1128 1700 cicuo.exe 91 PID 1700 wrote to memory of 1128 1700 cicuo.exe 91 PID 1700 wrote to memory of 1128 1700 cicuo.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe"C:\Users\Admin\AppData\Local\Temp\0c6c40a2fdb6c1cfbd1affbe96e2db4ee097e24452b4542c7ebcd7cb5df9daa3.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\cicuo.exe"C:\Users\Admin\AppData\Local\Temp\cicuo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\yqdor.exe"C:\Users\Admin\AppData\Local\Temp\yqdor.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b8238cf0c1a9e2cb268143e19df5b714
SHA1e71395251a8f69a5ce312aa47b2cd4d73576e16f
SHA256830d361f3d638a7a707d4c3ffdb37cae095102707b4d043f5220a5acae15ba4d
SHA512d76d26dbf1a107f26adde7f12b8b0a818427ae8fb4bd72f5a9113d3bbb4c26745784dfb8a0a4704f9ff417ea33630d6ae08c88b272a538975baf1147e6132cab
-
Filesize
593KB
MD531af710249c172376f36c5392a108f06
SHA1a3ac8b871a87a0a7b73587d6b76bf39728904db5
SHA256fc4fd79ea8db7fdbc73e11b968f2bb71eb1487f379d46b1788e3911ee93ccb04
SHA512791145d874f558a2e1d87a0d94e83e5f6f3bb5325ae88008cde58d64cafbdf7d0be96ad833b32cb43231573508563fcf3338c88a6637b2ef3bcd85d3653ac4f0
-
Filesize
512B
MD51e8e7ff46a7fcb19eb0062a43b7e856c
SHA1d8df1d4ffaee86882eb118df158c256c2556b331
SHA256411c525684c84eb0d4f58836b63935d8fbfc3ebb18c2ad339643398f6b223dbc
SHA512065eabfb28ae1ab76491b328821c25cfa5275a26db56eb7d74a9e3f9834ebab48afc90e60dab1b3a747f7542376411e290624cba8586028d4378c99bf6ea8e74
-
Filesize
323KB
MD50c2bdb92bf69dfc9b6d7eac74b8fde5a
SHA1387817cb5a39ce790bdb4626b8d50a536895e359
SHA256363ac139e9380f500ff68eadd7999edaab4b31389be3decaec4e087157c89876
SHA512e5c48b49923807895c7738537661e7b717e3c682eb1325e298d5688e6134e9eb045ea32115808696b4cbbc699ae4346bfc2de6ef64adae4d7eb5f2496a80518e