Analysis
-
max time kernel
149s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe
Resource
win7-20240729-en
General
-
Target
c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe
-
Size
333KB
-
MD5
b73a1d20ba44fc157c979919730d53b0
-
SHA1
68decb89026da30677cb4a15bfc06fd6731fcc43
-
SHA256
c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1
-
SHA512
885e5a1a60ea24c48a0532833c7c0254665d119c53dfc6ede7c929cbf408450235ba9bc295e0eb8e26ec0587c414795c061288bab0d51a5aa4237925e9e09c08
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9D:vHW138/iXWlK885rKlGSekcj66ciWD
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2884 goriv.exe 2160 hizoq.exe -
Loads dropped DLL 2 IoCs
pid Process 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 2884 goriv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hizoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goriv.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe 2160 hizoq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2884 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 30 PID 1232 wrote to memory of 2884 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 30 PID 1232 wrote to memory of 2884 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 30 PID 1232 wrote to memory of 2884 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 30 PID 1232 wrote to memory of 2796 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 31 PID 1232 wrote to memory of 2796 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 31 PID 1232 wrote to memory of 2796 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 31 PID 1232 wrote to memory of 2796 1232 c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe 31 PID 2884 wrote to memory of 2160 2884 goriv.exe 33 PID 2884 wrote to memory of 2160 2884 goriv.exe 33 PID 2884 wrote to memory of 2160 2884 goriv.exe 33 PID 2884 wrote to memory of 2160 2884 goriv.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe"C:\Users\Admin\AppData\Local\Temp\c894b6d294b57a79f7f2a1724559625acb76ad59487d4944991c15e8cc364ee1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\goriv.exe"C:\Users\Admin\AppData\Local\Temp\goriv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\hizoq.exe"C:\Users\Admin\AppData\Local\Temp\hizoq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5c326a90cd16d97acc9229102e6666204
SHA193c2b71d8d210da2c5cd2ea5b147eba0cad85022
SHA256887a78279680dece945f2b3f1f84e4e071a035b5d3be545b22b87d272c1f8d5b
SHA512f7a3401e4684c1f1fb50ee2265dcd21dd952f11c2b9149362f5f9f4ce1c8cc6c227e284d373a79294dc6c4abf03dd31d1dfed7e5bba99ac2a2655cd829343a34
-
Filesize
512B
MD5677f896daad9e8c48d58521a13998ab7
SHA1c1857b70baeea6f57fe732f9d04475db400cf7bd
SHA256b453fac792688c97064b813624d7eb6f5f0ae914e4ca6653e4a4347527d9ea60
SHA5129fe9684b43df66c9e433a5e752b87f34b042be38f1526f9728101933ae9175ae1052e272cef89ab53ca878b61e4fb287711e342430226dda7a684255eda7ec43
-
Filesize
333KB
MD512466b2e8aa72fd8cc0bb0fdd69246ec
SHA167f1edb72dafb2ea24cce22b05da481b3a0b3bc0
SHA256532146419cccb39f7eb175b4a6b7e92c3506d5f3c272c4cbd7c37b56d8251722
SHA51229c2b227a5168c01564faceee3935adc67eb655e5bab0c3e41b639459e5cdb692badf9237939f182e145ee246a852ea29693d07efda4a14b48a15432dc5a5e78
-
Filesize
172KB
MD5bdc026bc51cd59e91c9566130893bca1
SHA106a4e52a867324fd05065be16f698c0eb8f948c6
SHA256db5d2c5d8feaeed0501759b1ba956e59020497ace185e091817898691b179d75
SHA512e9c072d8ca2122be2c6e04b8b13bfdfbfda7eca051b10722e9b590a3cfc89717c707a97d979c742164ef0d0404ddeb2414cb982b28b369a0fb3b8b9240fd398b