Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/10/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe
Resource
win7-20240903-en
General
-
Target
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe
-
Size
333KB
-
MD5
8dd4853010e7db531898aa198b116300
-
SHA1
839c24033a06b4f9ff2abd065f12cbdec61d83e0
-
SHA256
2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f
-
SHA512
1be5cbce7454acf89b94ec27ef1f9c74c3a8ef53bb6a93dc3ca9243ef9a5d612b1400d7215a4107e95512f7f073c65e3ba7d90f735db74c990830acf0444b5f6
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9W:vHW138/iXWlK885rKlGSekcj66ciWW
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2152 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2832 bufyh.exe 2072 tykub.exe -
Loads dropped DLL 2 IoCs
pid Process 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 2832 bufyh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bufyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tykub.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe 2072 tykub.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2832 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 1740 wrote to memory of 2832 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 1740 wrote to memory of 2832 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 1740 wrote to memory of 2832 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 31 PID 1740 wrote to memory of 2152 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 1740 wrote to memory of 2152 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 1740 wrote to memory of 2152 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 1740 wrote to memory of 2152 1740 2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe 32 PID 2832 wrote to memory of 2072 2832 bufyh.exe 35 PID 2832 wrote to memory of 2072 2832 bufyh.exe 35 PID 2832 wrote to memory of 2072 2832 bufyh.exe 35 PID 2832 wrote to memory of 2072 2832 bufyh.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe"C:\Users\Admin\AppData\Local\Temp\2231e8328816958134c34b95effd63b6e36ba402c0c41d21eaf226c21f222c5f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\bufyh.exe"C:\Users\Admin\AppData\Local\Temp\bufyh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\tykub.exe"C:\Users\Admin\AppData\Local\Temp\tykub.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56fadf302779de6a35911ec20f44eaa9c
SHA1badefcb45d3e18eb9a4af1b8f9b53ba321fd4d26
SHA25680beb48d4f4f11b66385e3347cb54777a8376fc918532c6def8af74f6ee9e4a0
SHA512be028304116ebc759a74721b3d98f97f5948dcdd0767ad86a91e21daec21bd87407ce885c4c7e08f609d1ce89044bdbb04e6db2f1107b73bf344c74993d45001
-
Filesize
512B
MD5dcdf93d2677f7dcf46f25f74a2ff2ff1
SHA1d2bc78d672719cbce5a0339b93e639c0711639b6
SHA256df874fba81fc6cef5806fc84c0a0b56c2824a5e642c28db5ae7fd41de171d190
SHA5121c84183a47c30370e8aabc8ac1c3ca24c9979fba67cdc90f4a30d3f1168b8a1bc61c9ebc98b0b020d6ea9f516b18e8792256dcb73b8cdbb13c8e7b4af04e7831
-
Filesize
333KB
MD575b3d905093d3f8e5317b132552cf98a
SHA158d4d9509987db2bd28df627137c98ed32590c29
SHA2564a2cfe148d6b4be78e69dc5b2eaa733a3cbbd2f1fa2d36a8bbb4ebfe59c308d4
SHA512a1fa0adc1711b118b0956a8783969a3703a1cce476a8a47b07d642e3e8cd83671ae0d1fb10fa49c2a5218c44341b838480832417714cfceb7c7a363dcd3866cb
-
Filesize
172KB
MD58de3fc673693cdb0a0a0db60ad0de61e
SHA12e890befad494f0351d5c0b76419c6cbe9527f34
SHA256735efafa84aa38cd57802c28a98c6022b4bb08d05245c58bba126babcdc83c97
SHA51268528025471bbd479f2a352ca97dd2831691ea63205cd5c6f9049bd192e7d9c6006cdaa7d32aa5455403e54e7457d6c83c695a5c1e7998b36ec24ec876e7782f