Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 09:24
Behavioral task
behavioral1
Sample
4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe
Resource
win7-20240903-en
General
-
Target
4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe
-
Size
292KB
-
MD5
6e91f34c4b411dbfd5700e9c26ec9e50
-
SHA1
cda3d2eed281fa65a830c0a420b1494a6ad19ad3
-
SHA256
4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54
-
SHA512
1d3f7d8fd836994e130584599f41142f89f4258e82e3f6f5457875479ece1d1e30a7cfe20ec2fc0e9a36f15cbbe0062604e0d623cf791a90ff8e62e5092a03c5
-
SSDEEP
6144:tfkEtfjev+ueKJD68yXWsutct2XhhbbQ5iL/Zd:tvdP+yXpuWw3nQ5Yz
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
resource yara_rule behavioral2/files/0x0008000000023c8c-9.dat aspack_v212_v242 behavioral2/files/0x0002000000022188-50.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation entom.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation gosydy.exe -
Executes dropped EXE 3 IoCs
pid Process 4896 entom.exe 2168 gosydy.exe 1440 qegod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gosydy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qegod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language entom.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe 1440 qegod.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2968 wrote to memory of 4896 2968 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe 83 PID 2968 wrote to memory of 4896 2968 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe 83 PID 2968 wrote to memory of 4896 2968 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe 83 PID 2968 wrote to memory of 1928 2968 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe 84 PID 2968 wrote to memory of 1928 2968 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe 84 PID 2968 wrote to memory of 1928 2968 4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe 84 PID 4896 wrote to memory of 2168 4896 entom.exe 86 PID 4896 wrote to memory of 2168 4896 entom.exe 86 PID 4896 wrote to memory of 2168 4896 entom.exe 86 PID 2168 wrote to memory of 1440 2168 gosydy.exe 104 PID 2168 wrote to memory of 1440 2168 gosydy.exe 104 PID 2168 wrote to memory of 1440 2168 gosydy.exe 104 PID 2168 wrote to memory of 3660 2168 gosydy.exe 105 PID 2168 wrote to memory of 3660 2168 gosydy.exe 105 PID 2168 wrote to memory of 3660 2168 gosydy.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe"C:\Users\Admin\AppData\Local\Temp\4a83aac8e229fd8007f39ad18a282e5f6d2ea35dbb45495f00b4d6cc8ff40d54N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\entom.exe"C:\Users\Admin\AppData\Local\Temp\entom.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\gosydy.exe"C:\Users\Admin\AppData\Local\Temp\gosydy.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\qegod.exe"C:\Users\Admin\AppData\Local\Temp\qegod.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3660
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD57c16303c60e66e2b958c80e478fd57d7
SHA18161d987cebef704438efd70d635f768ea575428
SHA25654dcfce3a2d5b60cddb82f3a69a3903c420bdab25df2f839880d625a24a5d2dc
SHA5120eed435fb33bcbf02b2e4a69af8e73a1cf7f9ab2afa5faa8ce8185081db23e1a2c9c758c30bf88039fcf852b4268d2feeb0608132dd9520cb1df2ed0d0fb7989
-
Filesize
342B
MD5fd421fd548d7d4baa4c0b879d002b3ac
SHA1c576e390744166b07012631d71b3f154ae2d1c19
SHA256a1a48c2dcba16088ccfb641a5e1053337efe1f95bdd3fe66211101d457391f86
SHA5128b0e9a436abc3dccfe696831fc27e6c3c0012a2de84932a5cf7e9bb05a4311c01baa6dd2b4c05d158d10eac52903da3ed1bcd1db55ee9a015d4c99411c3ade1a
-
Filesize
292KB
MD56f4aecb911dab49a88c5848aa68eef15
SHA1da2188b91660ac2f8e8b412288f78e78cffc6306
SHA256da0ad76f4b2d1409c02c72f45ad46e9e29301358c1505ae2a55db8d6f822aa6e
SHA5122d01d57b451b801769ad6ebe8d3984b789ab6c9a5b5b10f7c4c87ab2d1c234e10c3c7e5aba689518515b6b5053737396df20352d1a8bde6274b44def4a699508
-
Filesize
512B
MD59b743bd387101cab0497e6a84d077783
SHA1ff1c6bb77b480a2bf84fb5fdf42ddf191ae826b1
SHA256c4a3a7b7c721ac18c5bf4b91ae9df878224af1e49465c5ab897f13f10a8eac7a
SHA5129ab587820678e580d6e572611ad560b023f9bd9c02f9758322d18a56c60d9c8b6084154417762a82c2728bd460ac702a102b2b558383b320ee30d7c5ba919f79
-
Filesize
216KB
MD57de317f023556ff708946484e850dca3
SHA194dc0f3c53b3ef9c53b69db1c1da2237e627b735
SHA256c67f9db7a1b43380b0fe36812c415d747a9d51f79f02d7be44e06fd7cb230b7e
SHA51279bc3c5db1ca7baaf348e55a87ef2fc16d601ca3048129ea753ecc22f85a092bc90cffcff1cebbb328a813f5757bea199087b54683084a18a53c5d7e8907bdb4