Analysis
-
max time kernel
95s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 16:43
Static task
static1
Behavioral task
behavioral1
Sample
f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe
Resource
win7-20240903-en
General
-
Target
f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe
-
Size
75KB
-
MD5
7015f3bc0a7664f85ff31387f5c654a0
-
SHA1
50c7dae5554e0fcede01f4a96695f7e5ab835763
-
SHA256
f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2
-
SHA512
bde6bd2d654b710a3ecf6a06832b00c1ff7b760964633018ef7490c2f6dad9e12004ea3ae881ea8acd710e76929fa80dc73c9abdbdf65c0689fa8cd41882b242
-
SSDEEP
1536:JBsRUZ2mpkX27tLUgk98l6h0JBDrDI6Rg4dOE:7NXkX27t5k8JRDIkgI
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Urelas family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 42 212 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\International\Geo\Nation f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe -
Executes dropped EXE 1 IoCs
pid Process 1960 dofhir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dofhir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1880 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3892 wrote to memory of 1960 3892 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 89 PID 3892 wrote to memory of 1960 3892 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 89 PID 3892 wrote to memory of 1960 3892 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 89 PID 3892 wrote to memory of 1688 3892 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 90 PID 3892 wrote to memory of 1688 3892 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 90 PID 3892 wrote to memory of 1688 3892 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe"C:\Users\Admin\AppData\Local\Temp\f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\dofhir.exe"C:\Users\Admin\AppData\Local\Temp\dofhir.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzgzNzUwNTI2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD57585d8d5302be9105d20f41c1dd4e962
SHA1256a416817f2c04ffff52bb83a2314e663a9e411
SHA256e17fee258bc60e2960bd8ee9ae466df76e5fd502f33bff6e8de185c8d21bcdc6
SHA5125099aa1a984a36bd8085548f15b22cf3bd39120b9b573816fa5d9299bc04f5ee8cf57444ba2d5bcfafb850f927f0bc66bd3a20639a77fd79a775744aaff57a71
-
Filesize
512B
MD54adffbc578ceaad93e361c4c2700b4e2
SHA13078a1c96cf37ee1bde1a548cec44c27f7a8720e
SHA256d0270cf0cebe5fc51dc8d55ffc5d23fcbb682d1822458bcb3d823101ba0a2045
SHA512812400e5e01e5fbaf7917f3d48a40f6d0c6f60bf2602f2827c2d9089022ebf174d04d79bf27bfb67638c78d0b3a86b26e7d4546243491ebb7955f456b9fd9245
-
Filesize
340B
MD59cd13ce5550efb114af6fef5f0b175ed
SHA10328aa28ea33edf45c14a7c7799162fdd94c5b27
SHA25675f49c2eb60c1b91317a5dc029b8b4f196926c2887618f4addf32d3c94e097ce
SHA5125bcef3a23c4637b2a08fa6d3fcbd3a00a9f9e771f55568697a8a8fd816f5b745ac36df54adb6dc373a66ce7499439232ed2d28531819bbb92dce68c99534aff1