Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 15:46
Static task
static1
Behavioral task
behavioral1
Sample
9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe
Resource
win7-20240903-en
General
-
Target
9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe
-
Size
337KB
-
MD5
c1749cd7a60df883adf4d15377083478
-
SHA1
b89e18680af6018a480f4bb831a580be789711fd
-
SHA256
9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf
-
SHA512
3a29e2e822b263dd19fe1b2a10b25ffb75e0d4eb4c8e85d50e42ffed882b904a19266fe9d915a8cd62cdc9a42a61852e2426125e57db67951638824f4ceac33c
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKoa:vHW138/iXWlK885rKlGSekcj66civ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation pehev.exe -
Executes dropped EXE 2 IoCs
pid Process 964 pehev.exe 3668 qasyu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pehev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qasyu.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe 3668 qasyu.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4028 wrote to memory of 964 4028 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 83 PID 4028 wrote to memory of 964 4028 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 83 PID 4028 wrote to memory of 964 4028 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 83 PID 4028 wrote to memory of 632 4028 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 84 PID 4028 wrote to memory of 632 4028 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 84 PID 4028 wrote to memory of 632 4028 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 84 PID 964 wrote to memory of 3668 964 pehev.exe 103 PID 964 wrote to memory of 3668 964 pehev.exe 103 PID 964 wrote to memory of 3668 964 pehev.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe"C:\Users\Admin\AppData\Local\Temp\9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\pehev.exe"C:\Users\Admin\AppData\Local\Temp\pehev.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\qasyu.exe"C:\Users\Admin\AppData\Local\Temp\qasyu.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b6e4312b24e36024f9be4452c1849b6a
SHA113008ddd8f6a8f27c9b38a96c06017f4eef6d296
SHA256f194a95ff2a879a8730113c1f2f3cf570dee5d609713e04e63e7089378fc99e7
SHA512be9bf5b9a124b14cfd5f4959382f3ce33eb2a26e9c2a6f5546be252974018f8df277e0917e0291d92fb86b695378050cd00aecf4fba97b8739794682f5c863f0
-
Filesize
512B
MD5fb01936f3bd904926174a1167c34bc11
SHA1cd0b691b5e406fc4e018a6e628a5cd0c0d3ab803
SHA256471503e534232f820279342c5aa09347f06b2f84cd043bebb5a5057b9fded490
SHA51259640cd3713e1649aa63c6847ec8e83e9b08f596ad8f7241f562365fbeeb5a5fb8518caeb2f3b312778a1389a64598e878d1c9c117fa029a24e5de21cc42c038
-
Filesize
337KB
MD5d70c271efa501fcb1c8d5cdc7534d124
SHA1fe6f7832d26773c16fa93aa6d494b2d70428c5b2
SHA25681934db0bfa6bd0ab7582bb1d70f9488a150785b843c9636380e8c8657467c41
SHA512810a4fa664d3765e93d2d954c22ecb0577081f224259b4d88c66da78f9f4b5c2ef32a558ee31fba1cd969bb01f223543618c3756c0724dd63a1a257887900bc9
-
Filesize
172KB
MD53d9df09ca0bab48c3ad890f2c7140109
SHA17f27a4c9f087870d22732df77717d414b32e0d8c
SHA256129564a786184f8a635a68831dd6913c7902086655909153e8a5e06461e9cc62
SHA5120039f23d72abb7d468b7e978f6b75fc9940ca88ff16579f3c793babc270aa5209da854b91d2b9ac2dcbbfc8314c14447ccd547614165a462e014c02c8580cd23