Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 08:53
Static task
static1
Behavioral task
behavioral1
Sample
79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe
Resource
win7-20240903-en
General
-
Target
79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe
-
Size
338KB
-
MD5
7730300521b224a4da2d229a23ee29be
-
SHA1
62658aa96fe03c486e556f494b45b3a99fa81df0
-
SHA256
79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4
-
SHA512
6dcbcffef2db950e9bfc272aca494a1279486d00bed0d754c28514ad86cdadbb3629dd28c50e8777d9594d0b5f4dc889cc3a9338192ceaf8ac09e5e8f240db4a
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKo5pF:vHW138/iXWlK885rKlGSekcj66ci8
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation heriu.exe -
Executes dropped EXE 2 IoCs
pid Process 4436 heriu.exe 1720 xolim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language heriu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xolim.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe 1720 xolim.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3024 wrote to memory of 4436 3024 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe 85 PID 3024 wrote to memory of 4436 3024 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe 85 PID 3024 wrote to memory of 4436 3024 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe 85 PID 3024 wrote to memory of 4036 3024 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe 86 PID 3024 wrote to memory of 4036 3024 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe 86 PID 3024 wrote to memory of 4036 3024 79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe 86 PID 4436 wrote to memory of 1720 4436 heriu.exe 107 PID 4436 wrote to memory of 1720 4436 heriu.exe 107 PID 4436 wrote to memory of 1720 4436 heriu.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe"C:\Users\Admin\AppData\Local\Temp\79f1b9a2adb8a4aff96e868172af10f853eab78e49b6fa1c34f27ff3e381e2d4.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\heriu.exe"C:\Users\Admin\AppData\Local\Temp\heriu.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\xolim.exe"C:\Users\Admin\AppData\Local\Temp\xolim.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD54bdc6497043a11b4c1ea9570b78fa632
SHA19670e689b4afea0d5a92ebac883220073c7a5770
SHA2562bd6369057c86b400c5ecaefa4d6080b36fbcb29521ce01419931f34840d69c0
SHA512cf82eefd80cbd9fa94aab54a32acc5813ac10607785b5d477d51dfccd3d93cc8bec90710108df0d6477a56ef1bb8911c564e0c2a404ea0f3ae717bc2cccdf36d
-
Filesize
512B
MD5a563e45556650fe0117a5e20a66e8822
SHA1a6457ad12d99f3ed59aaed3e635f3d9fe86bc356
SHA256c336bb127dfd13726537ab4ba720e62cb604212c502a26197812f11c8f570c88
SHA512865e9ef4b0da286c8f2c7aa86a784352707bd120cfab1aef5af2dcec80cedfc7d626437eb8b92cdfc7db31d9199cfd04e0ad9484ffba71a7b6de472d9e5d4cc8
-
Filesize
338KB
MD5e388dba4b63601f988d8ee063dddfe58
SHA1800e2547ad9de2bef67027f1ba56818f82c1137a
SHA256125dc55007cbce75c0dc686a6aea2f34b8165eca48b74124da60ba26de61c677
SHA512ad13f8a37a6065e122ed9fb559ed95f4300a4d0edcf934a61f3c0182fd133e9bef90064ee89ad20a3d386e627e9820a516b146a66b57d283832347975b381074
-
Filesize
172KB
MD538d4a399e7f208456ca238212fbbf699
SHA199510524dd8d43559f375d47ea049b7da5760253
SHA256e3247ad94e0434c2c84fa3a87d8329db32b7057eb3c828ccc17486bc4f8ad8e1
SHA512455cf498024c409338c724e73c9d300d697d617f378965ee24f67c381f459fff15957267cde3ce2a647ff565ae64fa10a189d75e836319265d411f7b98140d6d