Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/10/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe
Resource
win7-20240708-en
General
-
Target
13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe
-
Size
6.5MB
-
MD5
2d79ee62a77a440231513194bf879df1
-
SHA1
7a59cfc09fe94cd52d514d048b29e133b0c0b48d
-
SHA256
13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2
-
SHA512
854ce542f42bb05d638d121afdfb25dce43459b1f189764e8942286e4f88e374845ec1c2ae315d172b03849022244fc8914b5b9b21ef223776d18ad3f9cbcb24
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSW:i0LrA2kHKQHNk3og9unipQyOaOW
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2748 sunoe.exe 2176 ohmori.exe 2436 zatue.exe -
Loads dropped DLL 5 IoCs
pid Process 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 2748 sunoe.exe 2748 sunoe.exe 2176 ohmori.exe -
resource yara_rule behavioral1/files/0x000900000001653a-157.dat upx behavioral1/memory/2436-170-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/2176-161-0x0000000004980000-0x0000000004B19000-memory.dmp upx behavioral1/memory/2436-175-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohmori.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zatue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sunoe.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 2748 sunoe.exe 2176 ohmori.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe 2436 zatue.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2748 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 30 PID 2312 wrote to memory of 2748 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 30 PID 2312 wrote to memory of 2748 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 30 PID 2312 wrote to memory of 2748 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 30 PID 2312 wrote to memory of 2640 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 31 PID 2312 wrote to memory of 2640 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 31 PID 2312 wrote to memory of 2640 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 31 PID 2312 wrote to memory of 2640 2312 13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe 31 PID 2748 wrote to memory of 2176 2748 sunoe.exe 33 PID 2748 wrote to memory of 2176 2748 sunoe.exe 33 PID 2748 wrote to memory of 2176 2748 sunoe.exe 33 PID 2748 wrote to memory of 2176 2748 sunoe.exe 33 PID 2176 wrote to memory of 2436 2176 ohmori.exe 35 PID 2176 wrote to memory of 2436 2176 ohmori.exe 35 PID 2176 wrote to memory of 2436 2176 ohmori.exe 35 PID 2176 wrote to memory of 2436 2176 ohmori.exe 35 PID 2176 wrote to memory of 1752 2176 ohmori.exe 36 PID 2176 wrote to memory of 1752 2176 ohmori.exe 36 PID 2176 wrote to memory of 1752 2176 ohmori.exe 36 PID 2176 wrote to memory of 1752 2176 ohmori.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe"C:\Users\Admin\AppData\Local\Temp\13c8f3037f5b844b11225099d04caf929c2beb823ce7b8c019cf7abc56a9f1c2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\sunoe.exe"C:\Users\Admin\AppData\Local\Temp\sunoe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\ohmori.exe"C:\Users\Admin\AppData\Local\Temp\ohmori.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\zatue.exe"C:\Users\Admin\AppData\Local\Temp\zatue.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD557a93caee9ce94fb158feb1bc6933b88
SHA16c9b916e13e30b3cf3df151f1b38890ce73134b3
SHA256127cd8a8db56f85d29b1cdc2e41416f41037485a3ae0ee6036469fc7980c5e76
SHA512a78fa30ac514a9fe1febdeaec2d1757b79e486822bf199241ea95fa22f01178615e5df184418d31d112c0448828ccb9c47c5eaaa6bdf788e447137a81f31de17
-
Filesize
340B
MD574e484a662a0babd387f1ae5789551ec
SHA12f931a3d3615d900a2c3cadc75e4f5c252b3ff48
SHA2562e71d7aa4b45ff6ca4f774eac9cc9e8e1974febfb3b172e087974422bb6d7333
SHA512cbf27c08a7537b865de13f6f3f9de48bc809228d1921b8ce0803bbf86b8b7f172cff06774c5cd9a2e70651c6925f93b3b854c8e67c02a77bf41d1e7e656e6590
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD567e6e1618cd7e27c8bcf256c56c6f8b8
SHA1120210bc2ed819503109369709acf6ba78b780f3
SHA2569f695c722e61f7e1676946fed24cf7e2e92af3a2f5af42eb31efafba278b8533
SHA512d78548fc3411e56c4945be3b90a36057c509f5b12192a6beaae7afa0aa06bf4cd4cb8b2d869c31213053273e1651d7d348f446407686c4921720d45c19fb8382
-
Filesize
6.5MB
MD52befa346038a3fbdef21b64aa387eadc
SHA1e88957113747adbf77542de0ada6ec45355d188f
SHA256ae6e5e09b98d6924cab6f59fe1f50259e711c8c4aba9b683386865fdfa1d377a
SHA5124f9de4997f3e6b17e8b89f2b797f3da93c1894dd29f3a86075f532b4a9b04e364c9bc1cc714e38fd8e742e1e56187a86a9b0be1f8da4e73bcf4124fd78f6e48f
-
Filesize
459KB
MD557304859caf5ddd52bf156b0e93d4c85
SHA1b8aa82e313d27918d0925756fdb920895baf0ac2
SHA2567dfead075bb74bc03e48bdca3d35e74b53eb56db9e425a6fbb4be4dd595f6ae2
SHA512f1f25a0b9a11db1895af80ad58862050161203106260cdbbed371cca085d148f113b40b221ad78681b88427d295001998ce2d367e56b7e5bfa1e767d7dc5d08b