Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/10/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe
Resource
win7-20240903-en
General
-
Target
62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe
-
Size
333KB
-
MD5
a08624aa8369a8873d683590fb3f0fed
-
SHA1
75cb37084b41f2cfc3d9e4ec990a19631375e2b4
-
SHA256
62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778
-
SHA512
7431757670d2359ff3fe8a4ca2319ca09e1f3fafb769e3e6c91fdd47d69e978362fcea45995723435fd13bcc3b133a6300cba392659d6a068487d66023639088
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9P:vHW138/iXWlK885rKlGSekcj66ciWP
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2216 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2440 yvryk.exe 484 jucif.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 2440 yvryk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvryk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jucif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe 484 jucif.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2440 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 30 PID 1736 wrote to memory of 2440 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 30 PID 1736 wrote to memory of 2440 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 30 PID 1736 wrote to memory of 2440 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 30 PID 1736 wrote to memory of 2216 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 31 PID 1736 wrote to memory of 2216 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 31 PID 1736 wrote to memory of 2216 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 31 PID 1736 wrote to memory of 2216 1736 62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe 31 PID 2440 wrote to memory of 484 2440 yvryk.exe 34 PID 2440 wrote to memory of 484 2440 yvryk.exe 34 PID 2440 wrote to memory of 484 2440 yvryk.exe 34 PID 2440 wrote to memory of 484 2440 yvryk.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe"C:\Users\Admin\AppData\Local\Temp\62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\yvryk.exe"C:\Users\Admin\AppData\Local\Temp\yvryk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\jucif.exe"C:\Users\Admin\AppData\Local\Temp\jucif.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5ea2c3ad2177becefa293d8bff004fd8d
SHA184685598abf20b1813b4c475d5053b1969980504
SHA256d8a231e7959ce5232dfbb8c2501c5fbdfbf669a2226e9a3a8eec2ee7cf6d0dd7
SHA5125b27e8434474413af8ec35ee473cde03c9084420956861f22c81350ec572f70b6809ebbae2e7ccfdf2431149df730e9564f8e2456d72665fb364b86859c04ae6
-
Filesize
512B
MD59605c009b54cbb4aabdd80ba6d6e3a99
SHA1d61891cd8b63ddda2588f0f0a79f6baef1dc0d2e
SHA2565156c42aab4328613dfe9143d4c6b137b7bee52ea4ac8353d71eb78104401b98
SHA512d6a7369436993d44a94c6cb311a395436ee7295e53b5446a1747bcffb6dba297dfb7d40a760db71f2e6b44477cbfed0ea94e973560a6a764ca821dea41ec7364
-
Filesize
333KB
MD5f624273ff793659cc08174deb6e407a7
SHA1115a5b08423a457e565040e9d485dde28aa8ed6d
SHA25675a2a4934bb60238a02b2cedd7ec056ca698f978b1d5ea5ec18fdd2050179292
SHA512e6d1bd3dd0afa60ba013551eb8b61a94e533fa95e6451fb98832b1e7b58d9ae76452737155ffd7519f7823b938c4459e3df51c7390bcbe89ae2b13fbac337f34
-
Filesize
172KB
MD545a0b85aebee2311b54f990a29969159
SHA1848734b5350d0603ac3f499ef2eb24fdf551296e
SHA2569ce7b243ef3f4f0752b9405ff41e99f60e44d941f2ee201da6fa6f9ca0eb25a6
SHA512679562a68c81bb8279891ae0eea1cb30720efe3b7ee6427203e6411965d6c6547871cd8f936f157c353ffacb11771859781b98fcdfc27208ae958388483f8e9c
-
Filesize
333KB
MD596c3300eb9f91d37f240a879372ec6b5
SHA12197adb7c73a8343fe63ec5f432da3c6fd42ea9b
SHA2569ee381708fe040b9d2309dc7c07104dbae61b5681cb3a83e64ba0a36eae4f88f
SHA51227c71e88b6966f81472ddebf0ced89956444c26fb6c368032bbbfabbc3cd94fd01ecd591a41064513c04b98ebe5d0fdf83b7fbc1a185fcd000b9da14eb16fe59