Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 16:58
Static task
static1
Behavioral task
behavioral1
Sample
bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe
Resource
win7-20240903-en
General
-
Target
bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe
-
Size
337KB
-
MD5
5ce7a119af90e0558ac742b7ff225c75
-
SHA1
25c01e283782c843a1600e626960d968aead0a70
-
SHA256
bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904
-
SHA512
5da612dbe40bbb694ea1831a885dc7ad5a21f2f0ffa60b5bf0b026ed9db66eb8f0dac22a0c5c0a9a0ee0e39759bccdd66b8d925282f94c259564f4c29c5d1874
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcV7:vHW138/iXWlK885rKlGSekcj66ciw
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation pixig.exe -
Executes dropped EXE 2 IoCs
pid Process 4664 pixig.exe 4028 hiofo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pixig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hiofo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe 4028 hiofo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4664 4084 bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe 83 PID 4084 wrote to memory of 4664 4084 bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe 83 PID 4084 wrote to memory of 4664 4084 bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe 83 PID 4084 wrote to memory of 2572 4084 bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe 84 PID 4084 wrote to memory of 2572 4084 bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe 84 PID 4084 wrote to memory of 2572 4084 bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe 84 PID 4664 wrote to memory of 4028 4664 pixig.exe 95 PID 4664 wrote to memory of 4028 4664 pixig.exe 95 PID 4664 wrote to memory of 4028 4664 pixig.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe"C:\Users\Admin\AppData\Local\Temp\bca240552a66cb7cc3f33b2b866746372ce9d41ad3cc69fc963d39ed0a308904.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\pixig.exe"C:\Users\Admin\AppData\Local\Temp\pixig.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\hiofo.exe"C:\Users\Admin\AppData\Local\Temp\hiofo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56880b3379b9d40192e5012b8c8cb3222
SHA1e357f42e373ae361fae6047eb190e3c9890a94a9
SHA2563c691ecfa121e010e049f3d10dcc1c8451a92200ecf7ff6fc86160ea8dfc944e
SHA5128b6cb9c7d6db9ffb4bd7fd7aa58aab5778cca5e2641b7aa362ece5b32575a9cd2d4dd7859e4251f9ecf6c6c861aa7b3d8c1877babcde20db9c05f2afa68855ce
-
Filesize
512B
MD5cdd61950315c0a4b13d3bd69cbb0273f
SHA14c6cc263de69856f8ab3291849fc56682c8fe806
SHA2564c5dd7dc6f7bf392b890339795d98de644b24d9fad56da74566febf308362120
SHA5122107fc72f5c04a63e50862f3a1fb962aba1978de44af94129dac0d68d94b50f3779cc0eff65bd23afc1d08c93edb33d7f7f0497e3204b4adce96d0550fe8590f
-
Filesize
172KB
MD5acbd4ba4930078ee41ba98c8eec2be4a
SHA11fce14e1811e8bb48537db1ada986363fef3595c
SHA2562cd44380446f5832a652e86d4228e81d6fe4b04135206bc349b84a29d7e5c49f
SHA5124ba83644e6baf7cc22caaf68e9d25cc59f0f3ee945bc61274e2e5ebbf76460a8e76bc052ecdfe46183e069e6c36873a80567521e44c0416faf617b8c7311d2cf
-
Filesize
337KB
MD55ebff7b2af5de1b3813512f8c5200319
SHA1734b78fbb17d33b35ea4906b433effb2b4dfcc64
SHA2567c0ca5d9423a6d83ff7cf438ddd938fcf5999159eaa1be639b321bec3df383b2
SHA5122c8dafa6988c0900bbb74ba8d75b35a67dd34c5c82d8036925b788644d7f9ed34ce8c24d6a4a4b29c651879885b16d25ec22cf0562639ebf938efe3805fe1e2e