Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe
Resource
win7-20240903-en
General
-
Target
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe
-
Size
331KB
-
MD5
58ce05c8d85a601405b81ccda398ccd7
-
SHA1
d62b4c797bc633d1f5a2c4972fb854bef98ed31b
-
SHA256
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842
-
SHA512
a4da37e691149968aa0917d153967c465cf87993baa6cceb6c9486d62bc0b82969cafb30e93518990ef471dcc88d94c6329fc80a3a58be67e2bdb95050354c0c
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYd:vHW138/iXWlK885rKlGSekcj66ciQ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2932 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
qyced.execojas.exepid Process 1328 qyced.exe 1712 cojas.exe -
Loads dropped DLL 2 IoCs
Processes:
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exeqyced.exepid Process 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 1328 qyced.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exeqyced.execmd.execojas.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qyced.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cojas.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
cojas.exepid Process 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe 1712 cojas.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exeqyced.exedescription pid Process procid_target PID 2872 wrote to memory of 1328 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 28 PID 2872 wrote to memory of 1328 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 28 PID 2872 wrote to memory of 1328 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 28 PID 2872 wrote to memory of 1328 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 28 PID 2872 wrote to memory of 2932 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 29 PID 2872 wrote to memory of 2932 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 29 PID 2872 wrote to memory of 2932 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 29 PID 2872 wrote to memory of 2932 2872 6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe 29 PID 1328 wrote to memory of 1712 1328 qyced.exe 33 PID 1328 wrote to memory of 1712 1328 qyced.exe 33 PID 1328 wrote to memory of 1712 1328 qyced.exe 33 PID 1328 wrote to memory of 1712 1328 qyced.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe"C:\Users\Admin\AppData\Local\Temp\6f260c0a9c755cd77f1c9624f72beec9fff49b56233b3f91cbac405e17e36842.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\qyced.exe"C:\Users\Admin\AppData\Local\Temp\qyced.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\cojas.exe"C:\Users\Admin\AppData\Local\Temp\cojas.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5a5b1795728b662942114fb3bc208d709
SHA106544a3822b6bf1cd7bbcb730865a8908d2ef784
SHA256274009e193b1af404eaad6e63515a1bff124295973cfb179ce7bfe06ee04fec6
SHA512fff863ea7228c3316d7437fa04c9d53e6d959ba9272db85feffb3becea34b642b21f37225559169acac5b0e1ca6facd03615d9755c804fdcf473557a344c142b
-
Filesize
512B
MD56fbc6773418392470b90760fb3f34841
SHA115dcc917e95a7f0a3fe6f22b31477ced83af7055
SHA256d05f5c7b484f97329bb0b2543d42a3b4be99101107243fb782827fffb742d5fe
SHA512240e0e258ebc58297eb137bbb2d853da995dd8992266b52f7b76f1bb7ac725da3d19baf8e1c42af3a06f7961df6249a329c3d4d1573a096ed91083a7229e4c27
-
Filesize
172KB
MD5adb0254a2d1953f9c25f56640d5cc305
SHA1f19fec03238eb6828255c8d6ce4d614a3711b58b
SHA25644c4eab19b36d6ad23b9dbe160a7650696f17d898ed6298ad3dd0ac0a745b5ff
SHA5121ed00af6216b5da567ad1055b9396d499f9a509f6bf2e16355fee2c4c8d95462d92e2dbdb300044b4863efeeb5e28f30229c69a565b02136bb5e02e07654eed7
-
Filesize
331KB
MD5db01a29e739071bba88d44988cbc33eb
SHA16eb0cdaba172d41fcec38ebcb5554ace0a0cb55b
SHA2561af2491119c4b9b078ad5ae5d2e5e0592cee0b75d05de3c29df9069a8c725b3c
SHA5124de224bb9b9593b9fda36508aa3f3bdce86b8ce372429a5c15635327c3e058fe2d2bedf2cb4f0ef15dfb24c232661fb11ccf7cdff6e7b6399d131b2e4995bcb1