Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 00:53
Static task
static1
Behavioral task
behavioral1
Sample
b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe
Resource
win7-20240903-en
General
-
Target
b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe
-
Size
338KB
-
MD5
2b943ee14b3fcd4d5986b1e10de923c0
-
SHA1
126da8396b67a6576c88678d9c71bbdc860eeee6
-
SHA256
b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815
-
SHA512
f0040014214a389814da9e895e1d333be6e294edbd143e2bef4db7c6c89ffb35c305dd4db849a0ce726d2e7d5974035dfa4d20434b1257f08fc6761866e326c1
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKogA:vHW138/iXWlK885rKlGSekcj66cis
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation muruh.exe -
Executes dropped EXE 2 IoCs
pid Process 1624 muruh.exe 3712 qouzf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qouzf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muruh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe 3712 qouzf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1624 4460 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 83 PID 4460 wrote to memory of 1624 4460 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 83 PID 4460 wrote to memory of 1624 4460 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 83 PID 4460 wrote to memory of 5028 4460 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 84 PID 4460 wrote to memory of 5028 4460 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 84 PID 4460 wrote to memory of 5028 4460 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 84 PID 1624 wrote to memory of 3712 1624 muruh.exe 103 PID 1624 wrote to memory of 3712 1624 muruh.exe 103 PID 1624 wrote to memory of 3712 1624 muruh.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe"C:\Users\Admin\AppData\Local\Temp\b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\muruh.exe"C:\Users\Admin\AppData\Local\Temp\muruh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\qouzf.exe"C:\Users\Admin\AppData\Local\Temp\qouzf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD565abadae7463d90004aa7d5b0c2ae35a
SHA1a4a95bd5e8c540bb83546286f31451a59ab2d77c
SHA2560744cd2dd7d7a3a618b247817032cd9505f545cdedb59b35488e687be947fcd9
SHA5126c35c023b335618fe7d112bfa2b46197317767bfb87ab34d66e05a5c123c440011ce6dc6e1973bfca0302418255366f12560214b42c8904782bf4fb334fd276c
-
Filesize
512B
MD57ceffe14707a18a365106328e4b9e58d
SHA1abf7a0095b70cfe7801b1307066ce943ff028109
SHA256e829dcffc6bb105cef0202195ba9826b7b918057c806d9196e2454fc666ea89d
SHA512f6226fcee9a966dc9fff81e036410c30a0002f9f655686f90bb786317ec3491bf7386899ba68d3b4a2ac891f8b04aa1c29308351c29e93206a1b96da7554b2c6
-
Filesize
338KB
MD5c35fe2356b9648402e43bb95b5399bb9
SHA14054e88322a500e4dda11102122e96c88c717ec8
SHA256d18e2a698ac255c89f172d8660120f5dabc25968f6c1364fc40731104b36014a
SHA512fffe10506f09e0b4d47583a002019ced868c315cb0b3f012a389a6bec2e267d3e73ad15df8b9db575551ed23d5606532dd3150c0a80a89f7f7bfe633c2e0e08c
-
Filesize
172KB
MD5b6b3affe4488bb2add1db151def76f03
SHA1b2614688c93f6e80e5be6e9b0c0837b2c8a39f0d
SHA256c8f0357b4e88b7ecba05089afdaa2b1b2d613ac1610d9e21807c2a84f8744cb1
SHA512e92870f002408fb6dd5319ed11294be59680df21d5d1176045fdd9d50c41dc56e97207fc6dc23cd8334299cb4f9c122be0e555ab6ffbd0069bd649a5637407fc