Analysis
-
max time kernel
28s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 03:48
Behavioral task
behavioral1
Sample
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
Resource
win7-20240903-en
General
-
Target
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
-
Size
505KB
-
MD5
e8c2d1a78d3f6c19c06a82c8fa661946
-
SHA1
3dac0a7c3a8b17bb26283fe5e0f1f2547dc161c9
-
SHA256
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9
-
SHA512
f572a0740c2c823c3768fe89beebba122ecee8f6c036395908a7b37c2b64885ae1bcc8914e66b3eb97763a779463b3797d12d75eb1f9cfbb3cd6b2d4c8ee7ab9
-
SSDEEP
12288:N/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFO:N/D0caF8wvhb43pDbO
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe -
Executes dropped EXE 1 IoCs
pid Process 3988 qufoi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qufoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3988 2860 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 83 PID 2860 wrote to memory of 3988 2860 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 83 PID 2860 wrote to memory of 3988 2860 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 83 PID 2860 wrote to memory of 4740 2860 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 84 PID 2860 wrote to memory of 4740 2860 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 84 PID 2860 wrote to memory of 4740 2860 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\qufoi.exe"C:\Users\Admin\AppData\Local\Temp\qufoi.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5470456365dbdf08d67a707931b70b423
SHA1c1568446d3a6daf6e08ba343e1111b6f8cbd83d8
SHA256f0596ed299657ca0cc56dec4c2a6b056517a5697264f6fb5ae0f2df1f4995610
SHA512eef7c083f488e0161fef9dcd2dbd36821fa29c62407b0a2ceef20beef94dcf00969070314c9118237871075d0b60f43368795402236eb96c48cf3085489dca9c
-
Filesize
512B
MD547470b2f2d4924b0d1d17bfd49ab31bf
SHA17f8c15368235207c24d53a4e55c7c90e6800ac01
SHA2568a2f088335dfcb4dcb8c299b0f8945cbad1472de196eb43cf568c132fb14f011
SHA512e61cf62878b838493db0ad184077f44c6235e98f697d2389f622bccadf0ac78ae5a980c1ebc650c2361d4404a4da04f9641ef46e93a05e0333414ba82c81d065
-
Filesize
505KB
MD595dd326cee557b114ee05ca52bc4c01c
SHA14ac9e0a40bf0f47b05f67fa638a1fc73e375af36
SHA2564fb4f25ad593d9b0af2ee376b82a7057a779155581980dc68e2347149844745e
SHA51253c32a1829f6939cd7592253df5745afd348475548c18d6834b2b70fe24b410fe42d56de66f9c3a5987bb4e728781b47d8c5336f87b3a8c0ed802b51f52c2133