Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 10:54
Behavioral task
behavioral1
Sample
0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe
Resource
win7-20241010-en
General
-
Target
0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe
-
Size
446KB
-
MD5
019dd5686e62593b1a205d4d1a4b85d0
-
SHA1
2e9ecbe2eb2d55692a299be7f155117284f077de
-
SHA256
0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42a
-
SHA512
c083b7175daca3d47ca5e6b723de9178367be5dc1cd6a49f2509649e245a73ff83ca05e52626c0971dda3bd1c176d2182c40b1a884c1963bf9b20e77c3e43460
-
SSDEEP
6144:PEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpoG:PMpASIcWYx2U6hAJQnS
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2880 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
ryzoz.exeifhibi.exebiquv.exepid Process 1504 ryzoz.exe 2656 ifhibi.exe 2460 biquv.exe -
Loads dropped DLL 3 IoCs
Processes:
0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exeryzoz.exeifhibi.exepid Process 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 1504 ryzoz.exe 2656 ifhibi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
biquv.execmd.exe0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exeryzoz.execmd.exeifhibi.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biquv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryzoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifhibi.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
biquv.exepid Process 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe 2460 biquv.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exeryzoz.exeifhibi.exedescription pid Process procid_target PID 3040 wrote to memory of 1504 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 30 PID 3040 wrote to memory of 1504 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 30 PID 3040 wrote to memory of 1504 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 30 PID 3040 wrote to memory of 1504 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 30 PID 3040 wrote to memory of 2880 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 31 PID 3040 wrote to memory of 2880 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 31 PID 3040 wrote to memory of 2880 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 31 PID 3040 wrote to memory of 2880 3040 0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe 31 PID 1504 wrote to memory of 2656 1504 ryzoz.exe 33 PID 1504 wrote to memory of 2656 1504 ryzoz.exe 33 PID 1504 wrote to memory of 2656 1504 ryzoz.exe 33 PID 1504 wrote to memory of 2656 1504 ryzoz.exe 33 PID 2656 wrote to memory of 2460 2656 ifhibi.exe 34 PID 2656 wrote to memory of 2460 2656 ifhibi.exe 34 PID 2656 wrote to memory of 2460 2656 ifhibi.exe 34 PID 2656 wrote to memory of 2460 2656 ifhibi.exe 34 PID 2656 wrote to memory of 1532 2656 ifhibi.exe 35 PID 2656 wrote to memory of 1532 2656 ifhibi.exe 35 PID 2656 wrote to memory of 1532 2656 ifhibi.exe 35 PID 2656 wrote to memory of 1532 2656 ifhibi.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe"C:\Users\Admin\AppData\Local\Temp\0430d47ffd2ba594f4d9c097f1196404088be865e3224d692a4aa5d43ea7f42aN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\ryzoz.exe"C:\Users\Admin\AppData\Local\Temp\ryzoz.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\ifhibi.exe"C:\Users\Admin\AppData\Local\Temp\ifhibi.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\biquv.exe"C:\Users\Admin\AppData\Local\Temp\biquv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD58793e8e433434c5cee43ad475aa4d66c
SHA1d351f2ad621f15703700f01be489c6557b2cb6cd
SHA2569fe8bc2c5103c12e5bf4e54e427889bd1f8f00c98482a455c474829d13300e58
SHA512528537bc19535f822498b561840c4b81524101b2656c6b0eab4e83e36841f99e20d8d54fe7923f3b7e48e007e062b01a2cd4fc2ff93354e26597f061a1e971d2
-
Filesize
224B
MD5d2fe4946949417756bfddc2a2833224b
SHA1ad82bf8ddb335bbd7b3a6974ba6651217ffe7680
SHA2564aa7c7ff4691c4503694f7c54f87ddf361bb19e8e24ff2e56665764c7bd6720e
SHA512cc8501f4d582ea318f753c279aaaafab4a3f7cbd2ef2a3e4788cdda838b3d7d09df376bc69f6dcc193e9af88243559a626342fb0aa8a4514647058aabd5af1bd
-
Filesize
223KB
MD5b77eff9bc39d06dcb5a2d8b1bd02cae0
SHA18dc4cc8789ed50f3e33097499333f2540cc4ca10
SHA2563e0af021a10b0cb7ed57321b2c8216e6195cf5ba59002250c6de9dbe931f50da
SHA512da8104ab9bbfbaf791ae1d3162c53bb3a366f5a96a665a5ccf5da35a116dd4e53595d554ac8953579529ddc3345bdc0606cdb5e31f69558f479269451bcd274d
-
Filesize
512B
MD519db9578fc578f705660a46dbeda6073
SHA1417f332ab2978e5812eefc1f4712dac0c9405144
SHA256eab1653428880a680765b652b1af70c9da04295a0ea2f9a24bc45dd02f54b69e
SHA512a8a89e5d8b47891c1ff96e59d4ff0df2a496100fa7985d04f313e7b51eee8a4bb8ffecb376f965e7295029777ae4bc5a6308c5074968e8197c2e398fad53cd60
-
Filesize
446KB
MD5802e5c9c6d0fd15210e26ebbee6821d5
SHA1394ac92b460460e269a8ddcfe03cb8a8cd197716
SHA256b0410103c2dc243d10ed02808016b3e6252cd037bcb19287d67392e01f78de15
SHA5129b2d35b823aff835e370861b5f2897c86de1154ec657a17dd13b9ed1f92f97d816ea8e3dfb76abf3d35a96797f4c7aecd61b575479ccd41af57e089a93e965b4
-
Filesize
446KB
MD5b41e28f9d1973a4fc81650ebbcbc66b0
SHA1116f596f7c37a6f696e93d80b958bf1c034f840f
SHA2567f6350a944f4917fb00921fb67b92d8a0f44eeaca877264f81226a6456bf4cb5
SHA512fc8bed1a394189939bc19d34d253604ac6d407da9c20f17aa9beb41ed844e4f93a6dba3b294827cae927ebb006c1808c28bbaa1a18211a9d5a69c15c6aa6fb9a