Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 03:48
Behavioral task
behavioral1
Sample
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
Resource
win7-20240903-en
General
-
Target
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
-
Size
505KB
-
MD5
e8c2d1a78d3f6c19c06a82c8fa661946
-
SHA1
3dac0a7c3a8b17bb26283fe5e0f1f2547dc161c9
-
SHA256
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9
-
SHA512
f572a0740c2c823c3768fe89beebba122ecee8f6c036395908a7b37c2b64885ae1bcc8914e66b3eb97763a779463b3797d12d75eb1f9cfbb3cd6b2d4c8ee7ab9
-
SSDEEP
12288:N/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFO:N/D0caF8wvhb43pDbO
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation finil.exe -
Executes dropped EXE 2 IoCs
pid Process 1684 finil.exe 2084 elsiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language finil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elsiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe 2084 elsiz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1684 2504 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 83 PID 2504 wrote to memory of 1684 2504 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 83 PID 2504 wrote to memory of 1684 2504 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 83 PID 2504 wrote to memory of 2284 2504 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 84 PID 2504 wrote to memory of 2284 2504 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 84 PID 2504 wrote to memory of 2284 2504 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 84 PID 1684 wrote to memory of 2084 1684 finil.exe 102 PID 1684 wrote to memory of 2084 1684 finil.exe 102 PID 1684 wrote to memory of 2084 1684 finil.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\finil.exe"C:\Users\Admin\AppData\Local\Temp\finil.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\elsiz.exe"C:\Users\Admin\AppData\Local\Temp\elsiz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5470456365dbdf08d67a707931b70b423
SHA1c1568446d3a6daf6e08ba343e1111b6f8cbd83d8
SHA256f0596ed299657ca0cc56dec4c2a6b056517a5697264f6fb5ae0f2df1f4995610
SHA512eef7c083f488e0161fef9dcd2dbd36821fa29c62407b0a2ceef20beef94dcf00969070314c9118237871075d0b60f43368795402236eb96c48cf3085489dca9c
-
Filesize
218KB
MD56fb96267edff38b326dc6ca6895db8f0
SHA1ed8b2d3ddfb8705ab020ff97981ead7abfd02d49
SHA2561eea5842e9113dba773043be79d3fe6c94a8c420820d686787d7e407a4e84744
SHA51209d826d94a5664fc2df9b0f82fe5953503f67b81fc6622292e10de11f2c0297f9541f7c33250308c90eb5a5524f18c1f725cc8e1c273fa51616560e0b66d4807
-
Filesize
505KB
MD5691cd5c6da14e48eacf0dd7e0e89653c
SHA14ad8c68698478810690277c74eabb4ab1e66be25
SHA256d6fdad2422c0f4bfd19f5f62268330ef8a6ab7eb71ff4cadd3a439c1971737bd
SHA5121e1856e31859ba95e8d39fc8b2a8c8f25815314e8d443fa58401d228ea0881a788b53e764474a114e6b2127cb0aa208e942dd6a68c210ed986bfdfbe4555ec2d
-
Filesize
512B
MD5ca7049464318b5295e626c3508a507ee
SHA18e2fd0c873cdee46381c0ca73a0fc6c196f21de4
SHA25688e2f639e2542d179dfcfd85ea06f68ebfe6defb9de58dce3917c900aa579956
SHA512133d2d110767c096f45318609f00d1f153379752ed78ffd2956c8d391d12d0936b369add575d695efc04decd6722893f8a9e4bcc398f4c595134d011239389d0