Analysis
-
max time kernel
107s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 15:35
Static task
static1
Behavioral task
behavioral1
Sample
42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe
Resource
win7-20240903-en
General
-
Target
42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe
-
Size
59KB
-
MD5
36f26fcaae5cf8d3aa97fe7cf9f0b633
-
SHA1
d80e1ac4b25d6e1ea8b961fd5f2ec8438356bfef
-
SHA256
42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098
-
SHA512
f88cff7f310671a9f6efd3047b9652918cafa3d2923a067c574c15f3d753e42951f9870d8f4a9216354a29096acd01bcc27568a16fc882a92de7b90426afbda5
-
SSDEEP
768:jb4zb59Yix/RoyH+5flZirYqc97vFvrpaZG3DHvTdA9GgnOuS5Z3WXcKIZx5uDZ:jbQx5oPsr2vFxDPhAvzgdWLIZ7yZ
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe -
Executes dropped EXE 1 IoCs
pid Process 3612 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3612 2708 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe 83 PID 2708 wrote to memory of 3612 2708 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe 83 PID 2708 wrote to memory of 3612 2708 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe 83 PID 2708 wrote to memory of 116 2708 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe 84 PID 2708 wrote to memory of 116 2708 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe 84 PID 2708 wrote to memory of 116 2708 42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe"C:\Users\Admin\AppData\Local\Temp\42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD59c08dbf5b4fa740f61b6ea93a4bc4650
SHA10ef70e9e1bca89dc9e43bbf5bfdf19d009f64cfa
SHA25677836f344f0d7f28a53c98c106e19a06957d606f40e11bead373d4e84e5029e5
SHA512c08c736d16fdf0d0c703fc750c78d122958e4fe91c52caa3600a4de8a9b4ad297cff92d7dc12716284fba961ddcbb44274f0ce466ea49c4394e3720a28731b20
-
Filesize
512B
MD5f02bf69ff6351970bce3b50742a769ed
SHA1577db2279b6489628583d770f441f3316ff2a560
SHA256df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0
SHA51242a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979
-
Filesize
338B
MD5a24d9bdbd3aeff6356f5c8671cf20eae
SHA1d8aaaf3a9936c01bfb389fae3cd73ef6c82a3696
SHA2569a79179a5b6cafdff07668da12fc3a9870328bfa4b81047bb7bdd04d29180719
SHA512ef9c4ae996eb7fc5c9e3a40506a3c2e55938345fdf42501184e5f4f9f6460ec372e5887a73a3e8dd8e190c1412eeed0e82c725d463dce4bb670c26c509df0c5d