Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
Resource
win7-20240903-en
General
-
Target
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
-
Size
332KB
-
MD5
e5f8cc34c92ec51b668f856467e5d249
-
SHA1
aa954ce38e44d15e8519af2a28ae70a3f69caed0
-
SHA256
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48
-
SHA512
27aeaecff813fb2902e42480dba7b57a1f6adb29daa78aa9f23c0ead88db07e53fc9476c731488c08db81b151111dc91c8bf2e8e04a525c0959a0febb774a546
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66ciX
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1164 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ymxow.exevylyd.exepid Process 2136 ymxow.exe 1980 vylyd.exe -
Loads dropped DLL 2 IoCs
Processes:
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeymxow.exepid Process 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 2136 ymxow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vylyd.exe7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeymxow.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vylyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymxow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
vylyd.exepid Process 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe 1980 vylyd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exeymxow.exedescription pid Process procid_target PID 2128 wrote to memory of 2136 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2128 wrote to memory of 2136 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2128 wrote to memory of 2136 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2128 wrote to memory of 2136 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 30 PID 2128 wrote to memory of 1164 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2128 wrote to memory of 1164 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2128 wrote to memory of 1164 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2128 wrote to memory of 1164 2128 7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe 31 PID 2136 wrote to memory of 1980 2136 ymxow.exe 34 PID 2136 wrote to memory of 1980 2136 ymxow.exe 34 PID 2136 wrote to memory of 1980 2136 ymxow.exe 34 PID 2136 wrote to memory of 1980 2136 ymxow.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\ymxow.exe"C:\Users\Admin\AppData\Local\Temp\ymxow.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\vylyd.exe"C:\Users\Admin\AppData\Local\Temp\vylyd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c7811635d9753612a28ef415be1223f1
SHA109aa5099ae2977f728692cf9d6f6cbe30d195e95
SHA2568239d4347928a15f77a4eae63c8beedc56f6fe068bfd05b43016a7c299188648
SHA5120bab62e6764cd02aa03142aa6fee342a61ac6853e2bb3eadecd1aa20134339449a54e705ef378f16231cc09d1cad89694cbbf9afa75cfa39198a76aa54104247
-
Filesize
512B
MD580962832169179d99e3b7796e48b8dcf
SHA1f33abedeec146baa4e435008d9415ee38aec01eb
SHA2567174c44489f2a8f0e3c2f63bca5d0efb097fba2275037af10000fe7b49b2e86b
SHA512a225349cd7c5802de94928b9e8d8de97c7e4f2c4b3c1bbc362ef4b4493d05211cd2f0d9ec075f43aeeba2c0b02635375328fd309c6acf97de6eb1c2bf35eaf3f
-
Filesize
172KB
MD53ff91e08ad1346be8eeb2101ac3b594e
SHA14a8a67cb07faf7b0d7b09a14d2de304e9347a3f9
SHA2565314731fcc053590bdfd5e38f9d993eaf2cae2d22535bdcb0bf3ed7da16d6650
SHA51253b2b5696d19735f3a54d14fd775b4a7059fa720057f43205a989fcfb544bff0b1dbce4222b7487f242cfd1f876b14b317919329efdc9d0d1b7d6f84ef4ba67b
-
Filesize
332KB
MD5bd0619bd035d096362afddb6f433056a
SHA1a3be1ed5ebab292102b3cd0ed17a822157a66cef
SHA2565aa4473b23a2fdcdc8c71bb33509b1a70b818a19e306bb193940603bbde33980
SHA5127dbabbd3605fa10c784f278453d2d70ce417eb54ef03f47b5f5d4f694ce6d6fdb08197d97a228e7c42ef759daa1d51e0f4e1bc5458b2756d16982fd81893292b