Analysis
-
max time kernel
119s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 05:03 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe
Resource
win7-20240708-en
General
-
Target
4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe
-
Size
338KB
-
MD5
f8859f15a4d4487db21bb5be15231470
-
SHA1
7b09194ce75e78b96a06d806280449d701961300
-
SHA256
4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84
-
SHA512
e97ab670f8df2e03e834e6cb068bfec1e19b816daf31b6aaabf40161472ae306d281f4e387c5d76090876d6882bc6680d336264118371f6ea2c03f1760e28db6
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKogi:vHW138/iXWlK885rKlGSekcj66cie
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation exbir.exe -
Executes dropped EXE 2 IoCs
pid Process 4756 exbir.exe 1052 uzvup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exbir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzvup.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe 1052 uzvup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4756 4128 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe 83 PID 4128 wrote to memory of 4756 4128 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe 83 PID 4128 wrote to memory of 4756 4128 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe 83 PID 4128 wrote to memory of 1968 4128 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe 84 PID 4128 wrote to memory of 1968 4128 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe 84 PID 4128 wrote to memory of 1968 4128 4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe 84 PID 4756 wrote to memory of 1052 4756 exbir.exe 103 PID 4756 wrote to memory of 1052 4756 exbir.exe 103 PID 4756 wrote to memory of 1052 4756 exbir.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe"C:\Users\Admin\AppData\Local\Temp\4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\exbir.exe"C:\Users\Admin\AppData\Local\Temp\exbir.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\uzvup.exe"C:\Users\Admin\AppData\Local\Temp\uzvup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1968
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.15.31.184.in-addr.arpaIN PTRResponse57.15.31.184.in-addr.arpaIN PTRa184-31-15-57deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request168.100.16.2.in-addr.arpaIN PTRResponse168.100.16.2.in-addr.arpaIN PTRa2-16-100-168deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
57.15.31.184.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
168.100.16.2.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD53a87d228cd7ac1503813e8c4dcb295cb
SHA14c21092a9a916949b2577c24a4e051d7741b74a4
SHA256491f65dd41d09015edb38abbd12a2f37b73667f1c14afcf0a04d7216f4fc68be
SHA51218c8512555481600e63ce07aefb38048896ffaaa1b7f90d508594cfc05ebb00b989b7a8f87b915c9c1c2fb3b17ee3bccf278a36b31f7036cdff570a31778f12c
-
Filesize
338KB
MD5b48653337db9aa0cefe5902f14b09842
SHA1acc70d8f95ada4629df4a5eb885c72ba911ef61b
SHA256a59d872cd724d4aa005f1e7e914bd61ea00c19cdc94909e62f964a5ac396cb58
SHA51254538ff755fd06f9c32ab19eba713c016e21f3d936d252d7e0a7be8ae55f12d7a8084d5a6186a0bf255cdc92a9100703e631addb23fa7d4c9a3c88e0c6022db5
-
Filesize
512B
MD526f63ca396cb4f192f09006cc8ed0e0f
SHA11feb6af13bfd5e9c5f0fe026114311c941eea9e4
SHA256541393efed2429b9067a2bc026e80f76be3286033b16fdd41d8e5fbe548438c1
SHA512b3c170e5a9e3c8457e3fd28de0b9ca9e5c0a8f7d62acbae4891da65d3eada590c53df9e6ee10337adf4db1be3d494ea12821d13cf347a20b09949d048516576c
-
Filesize
172KB
MD59b12f7f35d2e4b01c468202407fe388d
SHA18437ac2d9a15d8f0bb279e0cb9c6202ca2e55b59
SHA25641529007bb8199c112fa7dcd97a434049839e3fc25372b32ed30793e631c36d6
SHA512e788935281c1724b34d05536490b6c54e986bfd6fff1b6c2022a5f0f6ab4347c87af77caccad3d1c2947be96245ec3572882c8ca8561346a16d84bdd7545afde