Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe
Resource
win7-20240903-en
General
-
Target
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe
-
Size
332KB
-
MD5
13992396b49c6e96678bffe09a3b8cb0
-
SHA1
49a6b856d8be5ed9e7e5835545a640f559f5b114
-
SHA256
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192
-
SHA512
5f38620cf2f423eb73b2aa323ae82c7ca51903f9456f5a2994a5960db7ce5cbebe5c89de9c3f4285487ccb0b872b7724a42a4189da5240624418831458f61f30
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYU:vHW138/iXWlK885rKlGSekcj66ciB
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2896 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
coqoo.exeegver.exepid Process 268 coqoo.exe 1712 egver.exe -
Loads dropped DLL 2 IoCs
Processes:
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.execoqoo.exepid Process 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 268 coqoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
egver.exe7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.execoqoo.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coqoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
egver.exepid Process 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe 1712 egver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.execoqoo.exedescription pid Process procid_target PID 2084 wrote to memory of 268 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 28 PID 2084 wrote to memory of 268 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 28 PID 2084 wrote to memory of 268 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 28 PID 2084 wrote to memory of 268 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 28 PID 2084 wrote to memory of 2896 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 29 PID 2084 wrote to memory of 2896 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 29 PID 2084 wrote to memory of 2896 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 29 PID 2084 wrote to memory of 2896 2084 7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe 29 PID 268 wrote to memory of 1712 268 coqoo.exe 33 PID 268 wrote to memory of 1712 268 coqoo.exe 33 PID 268 wrote to memory of 1712 268 coqoo.exe 33 PID 268 wrote to memory of 1712 268 coqoo.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe"C:\Users\Admin\AppData\Local\Temp\7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\coqoo.exe"C:\Users\Admin\AppData\Local\Temp\coqoo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\egver.exe"C:\Users\Admin\AppData\Local\Temp\egver.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD572cf3be34e2def38ded4e5de41ad1c36
SHA1b05f8a4e1443014527616972c605afad11326bea
SHA2568d17bab488d97db4cd55ffb3b62deb5eaed6dca58dfa797ba2c43bd734dbd725
SHA512e5fb259d814a1b4bcbbc833a27e439c5346b9aa084758be38097e3a9abbeb0676bb11ca912b398633a43e11b34ec802b2c930d8f9f5eed30d1305b4131706da2
-
Filesize
512B
MD58136c3a304e2d98e15dcec804f898fd7
SHA15021286c94e41834b104b51cc8f81c88b15fcc97
SHA2567b7b4c3f64070ef67d30eaec3294783506e5fed85c4f4c416b2a6fcfc8c0b60e
SHA512de63f83fc3d0737f978d9893203d2a559ce29ba90f09bf400771cfd04eddd7411349a44306b0f8b55f1620acfbb9d9119aed5ec05e836f7e508cfc31e2d1ddaf
-
Filesize
332KB
MD5bb0d4e7130ebf8d56d1d69d3247ec0ac
SHA1cc804d74ae97a15f3aaadd53f49b337f71994df5
SHA256047dff9812ad9e562305b65928f790f3d21c1dbdf3aab4ddb4620031cb5f19f9
SHA512a890a5b361c308236d564a3242edfb973d906242f67460aaba45d6587fdda9b696ba1b910a4b1c5fde8f1a021788369003b01cd11f16b178453887bb08d3e042
-
Filesize
172KB
MD58cf9610ab97b51fa5fd0c156d872818c
SHA1a5286349bca9db99faf0f63c870ae5eb95b22cf3
SHA2566c6235689969f3a895581a3f08b69c64aa111903d31e6b5e45225e132be33e3b
SHA512c332086a7c8109ec2efdd6d1306dd623a83d4f0d08e3a417d314ee2ee51b150aefc9ed310c2825c91da63d8fa4602ad9aec5410f8c228f319a9c4f58b391c779