Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 14:48
Behavioral task
behavioral1
Sample
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe
Resource
win7-20240903-en
General
-
Target
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe
-
Size
403KB
-
MD5
c769bee14908ab982b432883968b83e0
-
SHA1
c49f0b736847fa69ccc308f61ed6d5e65f6e128b
-
SHA256
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5
-
SHA512
90151e14f65afe3c9471a812591b9fd61f0cf3387ddcc2755ef9d59309c6529978e5001daad9ffbc65559eb3ca420123f5716b1b0a2897056f9876a72a88db44
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohl:8IfBoDWoyFblU6hAJQnOz
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2116 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
qoojt.exenuazxy.exequwyt.exepid Process 2868 qoojt.exe 2584 nuazxy.exe 2752 quwyt.exe -
Loads dropped DLL 5 IoCs
Processes:
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exeqoojt.exenuazxy.exepid Process 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 2868 qoojt.exe 2868 qoojt.exe 2584 nuazxy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exeqoojt.execmd.exenuazxy.exequwyt.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoojt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuazxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quwyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
quwyt.exepid Process 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe 2752 quwyt.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exeqoojt.exenuazxy.exedescription pid Process procid_target PID 2708 wrote to memory of 2868 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 31 PID 2708 wrote to memory of 2868 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 31 PID 2708 wrote to memory of 2868 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 31 PID 2708 wrote to memory of 2868 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 31 PID 2708 wrote to memory of 2116 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 32 PID 2708 wrote to memory of 2116 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 32 PID 2708 wrote to memory of 2116 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 32 PID 2708 wrote to memory of 2116 2708 8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe 32 PID 2868 wrote to memory of 2584 2868 qoojt.exe 34 PID 2868 wrote to memory of 2584 2868 qoojt.exe 34 PID 2868 wrote to memory of 2584 2868 qoojt.exe 34 PID 2868 wrote to memory of 2584 2868 qoojt.exe 34 PID 2584 wrote to memory of 2752 2584 nuazxy.exe 36 PID 2584 wrote to memory of 2752 2584 nuazxy.exe 36 PID 2584 wrote to memory of 2752 2584 nuazxy.exe 36 PID 2584 wrote to memory of 2752 2584 nuazxy.exe 36 PID 2584 wrote to memory of 536 2584 nuazxy.exe 37 PID 2584 wrote to memory of 536 2584 nuazxy.exe 37 PID 2584 wrote to memory of 536 2584 nuazxy.exe 37 PID 2584 wrote to memory of 536 2584 nuazxy.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe"C:\Users\Admin\AppData\Local\Temp\8fe4515d44b72e96a26bcf148ffeb52311de418255bc3e6c635e71c791d2fec5N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\qoojt.exe"C:\Users\Admin\AppData\Local\Temp\qoojt.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\nuazxy.exe"C:\Users\Admin\AppData\Local\Temp\nuazxy.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\quwyt.exe"C:\Users\Admin\AppData\Local\Temp\quwyt.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5d5cda0c50c2cfdd33e5d1f0f0a72a235
SHA1695bcf9195615b9e1971ba311d17bee0d7836ef6
SHA25669a5bed46ccae4ca029f3ddd8e18bfff5a799e3457fed5e0b3552ec10e2f378c
SHA512d29c5c1b562a201cc6cffd12ec571c6ac9d1e4ef1a1818d6625d55528a69569c9549a03bc017bf03bc96ad97685a10319fae72ee09c027b3272d17d1814096aa
-
Filesize
224B
MD555514e1e2a6533fc2f94c34e3a3963e0
SHA152a50d59bad50253d6ecf879d47c094982c52548
SHA25632601b1afd1ec00130cfc807654954c7cf3c77985665ecd3be5b949d7f4b3d38
SHA512a172c7f3310f5a5ea3567e802ccb30ebd627d48605e6440c97d301117807f5f8962ec63b83128d3ba21dc69bc251c76641ef2fca9f05572e0865c60af3d0cbe5
-
Filesize
512B
MD57cce3c7d55d423536b91269786d6acd4
SHA12a6d742783ed9ca09d480cbef8e481966382ed69
SHA2564c7646775a42da111cdc74910e84daa8b56d5d16c3176443b8daba8099b075f7
SHA5123811387ad9b7a60592d482ae624093daa9fcb1c71de4ddc428bd04222eb12bda92bb2915bba1a93fd728cefd26b71b16ed5db3cb6f63aff9d60ec1c2032b0998
-
Filesize
403KB
MD5a32331db7f74afc130f2c1872384b4b9
SHA1553a4029abee729c32bd38f363a5abf3298f4c16
SHA2565d915a80d9c3eb540d97a9330965284e5503c83225c9d0c028507d348e9b1508
SHA5122ed4cad9d695131c72feca1805e1b7c4b005f14031296a79184b76b0b7ff721f2cdc3882e9142a75246085ce5fb4647733b8caf2f8c1cf682da4c37d2cba7fb0
-
Filesize
403KB
MD50cb50e2c3897127ad8c7db18700b59f6
SHA1fd215ea35ab4db14b27125825488614346afb0c5
SHA256a41f337047493c843825c6e148b08048e445509d45107646245ceb57ec69ed54
SHA512004631b6fc5a48a3932d7f635fa615074087d0cbfe7cc5b81f72704752d4a4d3fad26af6266ae206d4d57fd6cb0a560e07a74c4de16d4ddfe0deefd41396eaca
-
Filesize
223KB
MD52cab8832ccd0827c0b153ea0f49b9bcd
SHA113119aaa53f665d9543150ee4276b3867094e563
SHA256387cce54f669ba2ce6557bcccf00373e3ad41d8f9be136ae9cead688a8cb1ef2
SHA512d93e5076957985d8e30c2e0fa8c94ac50444e004a9e304d6f696849999232c12c32535d86cc86e9de880638076b758ded3732f876dfadbce6ca23e112d971aa7