Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe
Resource
win7-20240903-en
General
-
Target
f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe
-
Size
332KB
-
MD5
83374076dc6ef5d043bea1f7c10d9cf4
-
SHA1
b62c29e9220f2ab6332ba3f284241b040d5f11bb
-
SHA256
f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f
-
SHA512
20581f3f8a28f35259b1b2b486668cc2a4b3ac7a9c2ebe8d676dbecbf9f75cee13500fb114cdfb4d53f901b0642e3de021412ec01d22bc6e1d1798fc3d8cef7d
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVU:vHW138/iXWlK885rKlGSekcj66ciEU
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2848 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ympuw.exemafow.exepid Process 2784 ympuw.exe 2264 mafow.exe -
Loads dropped DLL 2 IoCs
Processes:
f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exeympuw.exepid Process 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 2784 ympuw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mafow.exef3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exeympuw.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mafow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ympuw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
mafow.exepid Process 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe 2264 mafow.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exeympuw.exedescription pid Process procid_target PID 2664 wrote to memory of 2784 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 30 PID 2664 wrote to memory of 2784 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 30 PID 2664 wrote to memory of 2784 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 30 PID 2664 wrote to memory of 2784 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 30 PID 2664 wrote to memory of 2848 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 31 PID 2664 wrote to memory of 2848 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 31 PID 2664 wrote to memory of 2848 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 31 PID 2664 wrote to memory of 2848 2664 f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe 31 PID 2784 wrote to memory of 2264 2784 ympuw.exe 34 PID 2784 wrote to memory of 2264 2784 ympuw.exe 34 PID 2784 wrote to memory of 2264 2784 ympuw.exe 34 PID 2784 wrote to memory of 2264 2784 ympuw.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe"C:\Users\Admin\AppData\Local\Temp\f3af36c62543da904680017ab487af4301dcf4bc8434bc1870dadb35b65b106f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\ympuw.exe"C:\Users\Admin\AppData\Local\Temp\ympuw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\mafow.exe"C:\Users\Admin\AppData\Local\Temp\mafow.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD556c8c7ce1a30447dd8273707cccc2238
SHA1c6303e6f618cb8e809e0535627555b493e92c04f
SHA256c2f4d3aef0a6152f7c2b5a335e53056a45800c6ea1dc5d33c8059d98ebfaf28c
SHA5127065b88d808f760c521f5db7eb237bebe05a85c1e69f4000de3e89381021e8bcb8f9c8b540f8477d20e4addc5d2ec48d6ff170a597f8fc6b6994e27500cbf93e
-
Filesize
512B
MD50d571b735357ae51fc96ebc275ca7afa
SHA1bec0892ce49c1f66a54a8ef2190005428cbaf9a1
SHA256b26a4b08bead3d6fa36c1cd41674d0fe2510b2d8ec608e1876aae4949e274a57
SHA5123a37cce02479779ddfdadb2798625cbac89da911ec91c8d56eb90cfc0598493cf2411c163142ff3494a850b9c3dfbe3b4a60645e44e9716f8ae1aa295da9cb64
-
Filesize
332KB
MD578cf86891937dc5790cededd086d6140
SHA1e41d1ab47f22e3046b7f7035cf14e0ddee1dcf84
SHA256b630ad9870c175c91b4d1047291a56978a896ed99a1e46bc29e5181b6c1850f5
SHA512fea24c1952dfee9026dc889dddcda9c271c4ac3c982dd5122aeb970c167930201644ea95ba9820e49818cd5b1124e77eea45901ab5d483f346c67bd7d9238f18
-
Filesize
332KB
MD54429c411830e13c741c427b197d17b17
SHA16fc39fd3d942658f5940b657379c9352a90c0526
SHA25618ad7b1356e592ea16fa93183e6b05f91a4d39e35adcca17ef686650974fbb9e
SHA512f282c1664a4ebce8b150f6e8c7e8bb8e35076a4917be77517e4cdd3f04fe7dabd56757ffe824b44513c8ccb9486daf9f12d00470323bc5af635b9eabc49ca4cd
-
Filesize
172KB
MD500de4a72ef549e99dff2e5d96ef496c6
SHA1daf686e1931438021728a74806dff4d67c62edcb
SHA2560eb09de00475679a6d190477c631754ec4a2ff4cf26c9814c1391e8ad6ee3714
SHA512295ec4592ba4baa17a5761e2d49ca68631df1c1273df8d078e3e1d4941476b25b5afdb2d2fa63d071e50e2ddea27ec1714821489db3a84cfca64a020aa707d1c