Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
Resource
win7-20241010-en
General
-
Target
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
-
Size
332KB
-
MD5
e5f8cc34c92ec51b668f856467e5d249
-
SHA1
aa954ce38e44d15e8519af2a28ae70a3f69caed0
-
SHA256
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48
-
SHA512
27aeaecff813fb2902e42480dba7b57a1f6adb29daa78aa9f23c0ead88db07e53fc9476c731488c08db81b151111dc91c8bf2e8e04a525c0959a0febb774a546
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66ciX
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 876 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ehoju.exegioki.exepid Process 2764 ehoju.exe 1744 gioki.exe -
Loads dropped DLL 2 IoCs
Processes:
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeehoju.exepid Process 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 2764 ehoju.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeehoju.execmd.exegioki.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ehoju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gioki.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
gioki.exepid Process 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe 1744 gioki.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeehoju.exedescription pid Process procid_target PID 2372 wrote to memory of 2764 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2372 wrote to memory of 2764 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2372 wrote to memory of 2764 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2372 wrote to memory of 2764 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2372 wrote to memory of 876 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2372 wrote to memory of 876 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2372 wrote to memory of 876 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2372 wrote to memory of 876 2372 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2764 wrote to memory of 1744 2764 ehoju.exe 34 PID 2764 wrote to memory of 1744 2764 ehoju.exe 34 PID 2764 wrote to memory of 1744 2764 ehoju.exe 34 PID 2764 wrote to memory of 1744 2764 ehoju.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\ehoju.exe"C:\Users\Admin\AppData\Local\Temp\ehoju.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\gioki.exe"C:\Users\Admin\AppData\Local\Temp\gioki.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c7811635d9753612a28ef415be1223f1
SHA109aa5099ae2977f728692cf9d6f6cbe30d195e95
SHA2568239d4347928a15f77a4eae63c8beedc56f6fe068bfd05b43016a7c299188648
SHA5120bab62e6764cd02aa03142aa6fee342a61ac6853e2bb3eadecd1aa20134339449a54e705ef378f16231cc09d1cad89694cbbf9afa75cfa39198a76aa54104247
-
Filesize
512B
MD5ac59416ac7bc90363f4a0dedfb45a172
SHA18a89bdbee8165c010e256127e98827c0cadc4e43
SHA25670a43a28edda741f041df32bc4e3b743ef3e14469cbed4c4cff3f5c4cfce30fa
SHA512e8cf434d467a5e23a41315305497159cfa360523c6b53ef0b656a29afd3435b8c564c62dc277efce70d7460522a03ff070c6ded54da8d1fc69c8dbe1049fd44c
-
Filesize
332KB
MD5698ca18c64cdfe33a025e5f8055133c4
SHA17aa79ff72637006b45d85fef372b71454e5e4130
SHA2564a25d3bcc5a359c2ae5c7ce953e86fe07f8a1f54712891d37bce740dde5bf5c7
SHA512f31117e64e0818f46e20cc13abed277ed9c7aff0d1e0050ec3c185bea26ff89f705b28df8e775309c0f6a0e9cf9612be0c57e871dc2db067088b90f92de63ee7
-
Filesize
172KB
MD5ab2e98b362f618a0f3321b58dc667e2b
SHA19982afd97e9036530a693b9f235aacbdabce4cbd
SHA256e780f0505c31f301e848c44bf7ef704f7309b592ac75e4280a720b0c410fb4cb
SHA512ece64e362387adff138a43bdde6a268b50004ea84031c7f2451c2616216e448f7a701b2213dc6a221b97c99d40b5d98344062480f9ee9b73c37561462f9c596f