Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 11:44
Behavioral task
behavioral1
Sample
4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe
Resource
win7-20240903-en
General
-
Target
4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe
-
Size
429KB
-
MD5
dacc6d418d072c06eade262b258c043b
-
SHA1
f7e4c7eedd769c047acc5aab95393817fb88812e
-
SHA256
4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea
-
SHA512
091e1a82e3ee97224b4634f2c5ee8bc53ce292f3fb24c2119aa63c5e0536c764ed925f52240ba50e36b90175df9bef56c65053520c780cef914bd612bc5b29a5
-
SSDEEP
6144:BKbwhNxUjDVMytD2NkWuRk/oBmodd+sAaTmQo2fkKrQ:4ANxU3VH1t19MsAlpX/
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral2/files/0x0012000000023ab5-22.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation mynoz.exe -
Executes dropped EXE 2 IoCs
pid Process 2980 mynoz.exe 1664 ahbuc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahbuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mynoz.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe 1664 ahbuc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4188 wrote to memory of 2980 4188 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe 88 PID 4188 wrote to memory of 2980 4188 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe 88 PID 4188 wrote to memory of 2980 4188 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe 88 PID 4188 wrote to memory of 1368 4188 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe 89 PID 4188 wrote to memory of 1368 4188 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe 89 PID 4188 wrote to memory of 1368 4188 4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe 89 PID 2980 wrote to memory of 1664 2980 mynoz.exe 96 PID 2980 wrote to memory of 1664 2980 mynoz.exe 96 PID 2980 wrote to memory of 1664 2980 mynoz.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe"C:\Users\Admin\AppData\Local\Temp\4dae6ee0afb7f71b404c713179b1ca685074f082fa15f575f78311e5312092ea.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\mynoz.exe"C:\Users\Admin\AppData\Local\Temp\mynoz.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\ahbuc.exe"C:\Users\Admin\AppData\Local\Temp\ahbuc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5f6f1e0ac9b962fb35bc57a96e2559bb4
SHA170e1cd9d47475392f330b67043337e17face7192
SHA256c32d753df793f73f363aaa6f3001d60a97a558860cd39d8366bbb0cc72ad8abf
SHA512c769f4e7a51da737de1bf044946b37fd5f1f95042fe4d7ed174acf78916b8a9f2f112bed03d2d6dc67c5423942dffa4026b4e9c8bfd33f2103c6f9eaea360cb8
-
Filesize
216KB
MD5cbc1c7cf8b4218708c76b79f8880a978
SHA1b39079fda6ae859141a0753e20980afa67295e31
SHA256bb398874d86443c34381a238d17352fa4eeb06c95f9655cb08dcb321456d61b8
SHA51215da3df85ff2075d48532d238a36ac6a4f166f2b6655bec26686e0bde075120e6061f5d203af83bcedbcebebfe70eef311e1feb3cfd0e1fe7138ae436337dbdb
-
Filesize
512B
MD541aab0796d50cc32cc9ae57d1417fc91
SHA148bb8d1bf1cd322e363fef144e184b89dca4bbee
SHA256ef172682ddd8c48940a01c90a15af0a7c436e8eafa8539dee5ef612627ef7a20
SHA51203185f1460e31ccaf1efbe579dfa21eb27181995777994f32b709113fae18fb3e0d8cfaad1e3b8df79616d452c6b4ead3f532441a6b05632d0e29ac3874644fe
-
Filesize
429KB
MD57f29fefb8abb3f080e9564d246f9ffec
SHA15e64e659a1c370744d127ad9e98755945f6b9d60
SHA256f9c7ee0a9cd58ed787074484fcf27ddf0545b42da84df4073a044f8a1821a49e
SHA5124e6e1fa0d195d2763d3a0a31d5150f66e00e3c3e16484e33cb197f6f1d1397aaf562c25f63900819de4b1b8e6bf2e7b5af893badee2940c9c8b7c08daf003f53