Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 11:50
Static task
static1
Behavioral task
behavioral1
Sample
d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe
Resource
win7-20240903-en
General
-
Target
d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe
-
Size
336KB
-
MD5
36e12de34b6b64b1f73b9fa0a81c0b8e
-
SHA1
04468d239653de56d849aa888cda17243b2ccd52
-
SHA256
d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164
-
SHA512
b9c715b6c92cb63c2df631a2120a892a4d9a02792f219febbfb62611b23341ad8422faf861960d797b3baff5d09e474c342b03aedf5e0529378c99937c8b6927
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKoU:vHW138/iXWlK885rKlGSekcj66ciN
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation soxap.exe -
Executes dropped EXE 2 IoCs
pid Process 5064 soxap.exe 1636 emzos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soxap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emzos.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe 1636 emzos.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2320 wrote to memory of 5064 2320 d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe 82 PID 2320 wrote to memory of 5064 2320 d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe 82 PID 2320 wrote to memory of 5064 2320 d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe 82 PID 2320 wrote to memory of 3852 2320 d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe 83 PID 2320 wrote to memory of 3852 2320 d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe 83 PID 2320 wrote to memory of 3852 2320 d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe 83 PID 5064 wrote to memory of 1636 5064 soxap.exe 94 PID 5064 wrote to memory of 1636 5064 soxap.exe 94 PID 5064 wrote to memory of 1636 5064 soxap.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe"C:\Users\Admin\AppData\Local\Temp\d44b14b6aef930f5250008ae4042201e5a48b93f6222615f95c88b1c84fcd164.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\soxap.exe"C:\Users\Admin\AppData\Local\Temp\soxap.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\emzos.exe"C:\Users\Admin\AppData\Local\Temp\emzos.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD575db3e253909f16e19dd402633778525
SHA1626350eaa1d5a3a27317b08adb093d5be6eb6625
SHA256d73a1329fad2105dfeb4c7690f0b44f2498f7b0246f65f0812c423c3a45e2ca6
SHA5124ce319cfc8e1f81deb2dc77123d16824153602bc661dd59a670fec8945f48393c15d134aab62f62be68f3a43da69c5e0767106164bb941d5d621fab1c1422495
-
Filesize
172KB
MD594b25711ee58f3d2023ed396dae21818
SHA1aa927fa9e0e319db1d6d0aaa5633a2ee5f75b487
SHA256acabbb4a023d57fa2218f17c36d74561570ab1d6aa0abd4e93505afd2bd94ac8
SHA51260efddc1c9546577d108dafade2932e231c74b2b52668c4719ae77a1881d6ff88121c581e785821f8d55bfbd88024230540673e8ca04569d2853733969a3cad5
-
Filesize
512B
MD550c757b77851b61da175c38178a9d86f
SHA180323f59c7219d995473c850bab8774dc3495b79
SHA256f662595e78b9ca9ca65be79e316691980ee085a41246383feca41cf00b2e5992
SHA5128640d9f8f49492e3e2c274dd9b241716c0aa642528d6060c08a292473a8d12f4477518dd32c5ace6786c5994f655b1816042e2fd9791007987236fd37ed1f6b3
-
Filesize
336KB
MD51a1f8eafc14aed510af8db7badc383d2
SHA1ba09b60f324bdc1e3ef17faf838fed28a6e3e066
SHA2563dd54f888edbf1decfa9fce0f5a3989bb47c8b0843cef3c30e39aa118f7dbdca
SHA5126000872e04d748be335578a029f350d1551ab76bb3824e168465a732d9c40411ee2457b3746af00a661476fe315e1562d9d999c02b2d578548972fd5fee546e8