Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 13:59
Static task
static1
Behavioral task
behavioral1
Sample
fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe
Resource
win7-20240729-en
General
-
Target
fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe
-
Size
338KB
-
MD5
088084f12e63163e5382cc480bad2e93
-
SHA1
c39f9b08ae68f7470c0a98dedd253a11b5bdb67c
-
SHA256
fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716
-
SHA512
80d5c748b3d6bde042fd9b343b8aed1a5ad299701e4d8c3e336970bb56bf68e50ce65b7c601d7ce83ba1ce18d3721ae61f60b5b95bf08cffc14ea7714f25b247
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKoJ8:vHW138/iXWlK885rKlGSekcj66ciL
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation qawos.exe -
Executes dropped EXE 2 IoCs
pid Process 1740 qawos.exe 1332 xezog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qawos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xezog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe 1332 xezog.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4560 wrote to memory of 1740 4560 fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe 86 PID 4560 wrote to memory of 1740 4560 fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe 86 PID 4560 wrote to memory of 1740 4560 fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe 86 PID 4560 wrote to memory of 2572 4560 fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe 87 PID 4560 wrote to memory of 2572 4560 fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe 87 PID 4560 wrote to memory of 2572 4560 fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe 87 PID 1740 wrote to memory of 1332 1740 qawos.exe 95 PID 1740 wrote to memory of 1332 1740 qawos.exe 95 PID 1740 wrote to memory of 1332 1740 qawos.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe"C:\Users\Admin\AppData\Local\Temp\fa67aaa1172b1c7bd4e59ad2f86d589649c61b3c46cc4b391e65629c2cad0716.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\qawos.exe"C:\Users\Admin\AppData\Local\Temp\qawos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\xezog.exe"C:\Users\Admin\AppData\Local\Temp\xezog.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD58e918133c5c5405da82c46289c28b9e4
SHA1755628ad899d047c27fc2c6c8ff57c10e0c9b284
SHA256a7080ac0fb811806b84bd13117007765850fdc2f9ab97ec9fe5a7aae07a92e92
SHA5121fa4bbaba503a3fb314007e479abf9d30dd52a3635103f0fc829e550bee6510f34b82fe7fc6c0614d6ed02d5480f6f3246e17071843a898ceb867d2bb75bc506
-
Filesize
512B
MD5d5e1b7054e3d41b403b4638f894cf53a
SHA11f22c593edc3875db1eaa125738e7eaefbb52c37
SHA25650bcc84fc9e18d3577046eba6abc3dcfef36ff8eb2462e7347c6c8419d348cda
SHA51287d30b48ac3fb5daf1cc24bd5a791e858a8331736a26ef1971e4a6f6e25c0f3fbec51de5c251f5ea7f73b9edc293c91151cbd9684bc4e41421a8dff3d469d5ac
-
Filesize
338KB
MD5a439e48e60385fb06cc4aaee12692ce0
SHA18dcd1c250a2bcf23e7b633fa8883d9be4c24b4bc
SHA2564fb4504f5151320f265fc0e13d4a91a0634121f65b8ab15f064945be1f4caf93
SHA51285a1267c5283e52d99e64883220df49c15760021571e32559a342eff2294a7c2517ec69bab462c8deb409499117c2158be5a6b27544e9ff86024ef6caee88d49
-
Filesize
172KB
MD5f73798727197c4dcb4ef8a02e8dec579
SHA1f5e32236aa96daa00ad48a9749e035cf0f755e2f
SHA2561b8b028e83790fb3f612c9f382f230a24edaac190eac1820c5648b720bc7af88
SHA5123c09c9109747e0a241be28d029b95eaddbdda5ae2d0abc3aedf5c567d9b5c0aab7fb0566f2420a0e7fab3fc95db3ddebf83fd3a35a6c03f0ab17ed68d574c273