Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 09:14
Behavioral task
behavioral1
Sample
2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe
Resource
win7-20240903-en
General
-
Target
2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe
-
Size
505KB
-
MD5
bd35f0407a0cf61a87a380c74c366287
-
SHA1
20930e309ef62b4059d380c328f61f787da8fa5b
-
SHA256
2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88
-
SHA512
735688a7a400efb6576d72fd792a43597b4fa337c536399c3a5fc3b3d1b37fc4d88a78f69b99dcb2c67b953c66653e88fb74d8f84b2f5e57ae035e8c14866286
-
SSDEEP
12288:N/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFo:N/D0caF8wvhb43pDbo
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation lofoi.exe -
Executes dropped EXE 2 IoCs
pid Process 1132 lofoi.exe 716 bozop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bozop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lofoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe 716 bozop.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1132 1912 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe 83 PID 1912 wrote to memory of 1132 1912 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe 83 PID 1912 wrote to memory of 1132 1912 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe 83 PID 1912 wrote to memory of 4456 1912 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe 84 PID 1912 wrote to memory of 4456 1912 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe 84 PID 1912 wrote to memory of 4456 1912 2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe 84 PID 1132 wrote to memory of 716 1132 lofoi.exe 104 PID 1132 wrote to memory of 716 1132 lofoi.exe 104 PID 1132 wrote to memory of 716 1132 lofoi.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe"C:\Users\Admin\AppData\Local\Temp\2c5e1bce9e3c5c9ebdd258d9b179eb03110306638cdeb6b32b182de4924d9d88.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\lofoi.exe"C:\Users\Admin\AppData\Local\Temp\lofoi.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\bozop.exe"C:\Users\Admin\AppData\Local\Temp\bozop.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5e68ba48fc4a2206e5b34d59319f37a9b
SHA180c8ad7fd2874a0c69f1fffdec58d283196f6a7e
SHA256f360cbdbac54ebe4dfc65cf810fffb4eebbd5796768420441178a85e46db54fe
SHA5129b6e820618c80c68d037b9afbbdcfda6975acdd62764e8539e9be536e61ae3bc173170090c8d2858f31074dc82bb254bd9798ac42d9f924f803240e717bf1cd7
-
Filesize
218KB
MD5e3269e86f4d3c6ddea38fd02d429890e
SHA130514bdd30b11ccf5f782f6977cf45f41f8904cd
SHA25674b5ad3db8e01309facb6ecdb7d802de64c8d30b88a63a02dd6f4ccfdd78e174
SHA5123c697ed4f16b0da9993d339fab11526e6e57991d9e0ed2a026a8b7af70bc6b2be5599905a3aa1461d18775cdad3a4d34dd72698b0f10b352bcbe8b84aa732b00
-
Filesize
512B
MD5539b443c0638d17d7031500220d5ccc8
SHA19c7a93dbda1b1bf28dbd8584eb9dac9d6a777f52
SHA256ff8134b5a07d14d39b27d8266a092f6343841dca3b2427d4dd580939cc524e53
SHA5125262e9d3af5f57bd4da13f062157abbfcc89d827ac260983bb6d26520e4424f92ecc26593da0c06d7c9e8cf01fdf4038ce214410730adcba354fb6fbababf0d9
-
Filesize
505KB
MD5471495917b58e3d8d354fcf9291b8c2c
SHA162a517b7eb2eedb7b3f7923275663c635d9486e9
SHA256616d2404a55e35b24beda7d364b4dd50cec633614ba1e3142e8598d69081ddf9
SHA512fbb4d5e262f61528a057f1c983da0e6c339faacb8eeca7d1099d8d5e57b4d2bcae0d1b30ff9150a875a33c7fcb22055ec72aadf7089031da0064f74b90561d2c