Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 16:02
Static task
static1
Behavioral task
behavioral1
Sample
2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe
Resource
win7-20240708-en
General
-
Target
2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe
-
Size
336KB
-
MD5
ff1817b08ea77c8c294fbf1049f790dc
-
SHA1
f21658cb7f42b850e1fc3e93e439748906c79d43
-
SHA256
2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953
-
SHA512
adad32955a742b788b893237531065dc1ed9b7d74d2e0579f69c6d06910e630d5b161b3728db2d6cdd8d5ec306ca5a713f1d0c1104f5699062b4f5e6529271ef
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcV8:vHW138/iXWlK885rKlGSekcj66cit
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation gobei.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe -
Executes dropped EXE 2 IoCs
pid Process 4764 gobei.exe 2160 rudie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gobei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rudie.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe 2160 rudie.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4764 1168 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 82 PID 1168 wrote to memory of 4764 1168 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 82 PID 1168 wrote to memory of 4764 1168 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 82 PID 1168 wrote to memory of 2784 1168 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 83 PID 1168 wrote to memory of 2784 1168 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 83 PID 1168 wrote to memory of 2784 1168 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 83 PID 4764 wrote to memory of 2160 4764 gobei.exe 94 PID 4764 wrote to memory of 2160 4764 gobei.exe 94 PID 4764 wrote to memory of 2160 4764 gobei.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe"C:\Users\Admin\AppData\Local\Temp\2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\gobei.exe"C:\Users\Admin\AppData\Local\Temp\gobei.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\rudie.exe"C:\Users\Admin\AppData\Local\Temp\rudie.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d9b0232951891b7faff98f26ba025c57
SHA110aa402f65ddac3a5009f7c6c55184fd1d3a0a5e
SHA256592d5682515939e91049f2256fbc892e93543a64c19207ebbb6cf2f774c69cd5
SHA51206696c7cc6480da54672b6d9a97d432f73a1dce7a062ba54a5c3f54ced7c743447ee8aeaaa825b97cdba771bc3216f469afd50bcaef1415f2543860fa48efea4
-
Filesize
336KB
MD5df2324d2d8e440e01d54217bf24a4a0f
SHA1fc2cbd6de7d9d8cdc3608ea43524c6111b304d5e
SHA256df2b0dd7ba0b593267603e89ec493beaeaae72591e098b49dc6f04a446af7646
SHA5122e8784b063bed208dde73e940de8d915721317f09a375d1c74839b3283cb378838aba3093ee4986ea85323fcfd781ed862402235801dc798b0e0863821108d6b
-
Filesize
512B
MD5e5b9afaad820b2520adf555c610d36f6
SHA1f62653253b340c69023ebc6a2a814179f396ade7
SHA256e8fe0d5b6f29ba9afc347a3bc45337362f430534d5a501322d39c5a65d085270
SHA512171a67d1369d54f585845b8e8f7dd1d5b6f118b6d99ea172df755ac6eda4f71c66762f023884824875dbf4c7ce2f518f36b645fa1b046fe4cabe5b058c0d0646
-
Filesize
172KB
MD5198c8a3ee8a311a334113eaa3cd8afc3
SHA1b6cd9d8274a3b6722498c03e7038372e01c56019
SHA2561e2825ad35937ec67de931f237c8f19f11a02eca116535207a90b30a178e16af
SHA51260ed062d2c6789fe732b5ab77f1d6dbb3f5db6ac10ebe6869e714c3b76be53bd4c19ed4dc725f0e3163dcd5d89f90f2df3060e0a4c7826783ec9ef7f6e9e0dff