Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 14:44
Behavioral task
behavioral1
Sample
115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe
Resource
win7-20241010-en
General
-
Target
115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe
-
Size
552KB
-
MD5
4489826c2eca1eb1a0123c0c46e6aca0
-
SHA1
1c006df93d42fa028e21a7f98c6ac8afc5198b25
-
SHA256
115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8
-
SHA512
b978da9070fb82166238114fb80f5b48acb6249a0854e5bc0fb695e759684f6e744282ff3c03c074ecf448b873d9993dd085e82c5e572b83b334c3a7435b0456
-
SSDEEP
12288:++GtVfjTQSaoINAHT1VQ1i3SyQEW85gzl8:+rt4/NArwjs5ol8
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1664 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ozxij.exeqehyj.exepid Process 1648 ozxij.exe 2672 qehyj.exe -
Loads dropped DLL 2 IoCs
Processes:
115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exeozxij.exepid Process 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 1648 ozxij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exeozxij.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozxij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exeozxij.exedescription pid Process procid_target PID 1668 wrote to memory of 1648 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 31 PID 1668 wrote to memory of 1648 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 31 PID 1668 wrote to memory of 1648 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 31 PID 1668 wrote to memory of 1648 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 31 PID 1668 wrote to memory of 1664 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 32 PID 1668 wrote to memory of 1664 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 32 PID 1668 wrote to memory of 1664 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 32 PID 1668 wrote to memory of 1664 1668 115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe 32 PID 1648 wrote to memory of 2672 1648 ozxij.exe 35 PID 1648 wrote to memory of 2672 1648 ozxij.exe 35 PID 1648 wrote to memory of 2672 1648 ozxij.exe 35 PID 1648 wrote to memory of 2672 1648 ozxij.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe"C:\Users\Admin\AppData\Local\Temp\115952ec8a3a073ab20b7df3a238a827b8fed5032be3e5c67d680230552121b8N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\ozxij.exe"C:\Users\Admin\AppData\Local\Temp\ozxij.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\qehyj.exe"C:\Users\Admin\AppData\Local\Temp\qehyj.exe"3⤵
- Executes dropped EXE
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD50f0d77ec69a66789ea072d5c8bf4594a
SHA1c531b09c9e1045cf2542b197c269453be309d407
SHA256170ab95cdfdf6d30e989295586f58aa23a84d8323a7af784439881b2577b8259
SHA512144ce94591a25576edf368de017aa70a81af0db83464c23931143c4da632667520a23ba95487c034e5067ed45397dace571f3efb300957611d28bf749d617de0
-
Filesize
512B
MD5ed1a613024060167b9129bf25fc486d4
SHA171d13c793c7ea692e45faa4f28ecc08c285b2f8b
SHA256e6f6e0eb245188cf74197babb25bd3d50efd4425ee45beb05f4a7fd8a56360f7
SHA512e38fd8d3a0eafd04c582f5d7af91be5e99dffab93733273d877fab221608c9c1753a2fd92cd70f8d90416022b9d2a5c7d4968eb0978e963182687b455614ad0c
-
Filesize
231KB
MD5a7698b6ecc9c6d606cf4a67c04470351
SHA1e4ab3306c8f7d776f0daf22e94fe6e9125a1377e
SHA2562bed0f9420c12e552cd5bc6f187c269eec68dcdc6c200c16bc281379a4485f6b
SHA5128f3142a5a79281894f19ea39dfadbfe98e57ceef966e105edcc6431a272fe3250269b77483b4be908a18766b56f5f7daaf53f8303664f7db7eedcbb89f553d46
-
Filesize
552KB
MD56e14e8bbabffa0b2dadd87a15fb7ae7c
SHA1dfc0b40c713664f5de672632fe997e7fe2cd0a64
SHA256e997a22f5480046b28699d7df84e7a3ea06dbb03bd66d50f6c31833e559c4833
SHA51279d8e85f50c5a23329723de15eaba8ae78108ee621ad947a84243f369bcd2dd94b282261bce6fc32aedf57c1ce140042342ddcc0a728b2b57cfec5de8b3b939b