Analysis
-
max time kernel
89s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe
Resource
win7-20241023-en
General
-
Target
0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe
-
Size
49KB
-
MD5
84e63751dcce88297cfdae111ed1b020
-
SHA1
7ede73c969958ad17f20e6edcd5f3908b92993f7
-
SHA256
0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235
-
SHA512
149401fe32f0a44bbef51e2186a18b8ef5c8e2dd85ca8d45c36b9258c5357115ca62423f357886e38711e0a35d83cdfe0a928ce1b549d901408b6ea32f456fa4
-
SSDEEP
1536:834/PC7Ruz3hRXRASULZ6JKYdbzcmhCZnc:It7R8fU6n8c
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1776 mokdhft.exe -
Loads dropped DLL 1 IoCs
pid Process 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mokdhft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1776 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 30 PID 1736 wrote to memory of 1776 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 30 PID 1736 wrote to memory of 1776 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 30 PID 1736 wrote to memory of 1776 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 30 PID 1736 wrote to memory of 2452 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 31 PID 1736 wrote to memory of 2452 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 31 PID 1736 wrote to memory of 2452 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 31 PID 1736 wrote to memory of 2452 1736 0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe"C:\Users\Admin\AppData\Local\Temp\0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD539e55c2b5135dd669ad371cc03d79fc2
SHA1d027fea84a269f8e556dfb5411ac3d01b9311017
SHA256ecf7b9f0150af34b1d09f4602f0acf31445ff28e40b2411b0e32180bb8672919
SHA512e75942d900b97d254097d8a44bfde16bdc99cc0f124541316a0987b2fb5433b7b1f12d4eff8b47d05e9068e7a038e4dd92998646448dcb0d6615a81a561ef280
-
Filesize
340B
MD52f516ba1c97371c7f6b791315f6135a6
SHA11c9cf73fd90433578720021bd3d6ae5fce28102c
SHA2568f856046d4360b3f1894a474256004e56f7b9d026a10673c541f8e1ef2b63c91
SHA5122ac7712219c15fde3fadb4b70ebc7666378c5b58cb65ca5e11242676ba4cfdae08a6c6389ea1615d9c4013559188a126df78614d3e39007fedf31b71be1e3ca8
-
Filesize
49KB
MD5d87708f16fb6372e1024cb2bb137e528
SHA181c5f180d1b8d7e8ae6a857a88c3f00e105f8ecc
SHA256f904f260e1f38d93a67a80fc3c7fd1d61e4e9bc2f3f14fe858f0e289738d2783
SHA5127f95a0283efe17ecfff8b9660cde23780c19bd40f79a08b00de4ba92ed2c9b008eeb9abdc7599589a460d7f2daa871aee6e3ad938b14d747b2f26d5629e90f7c