Analysis
-
max time kernel
90s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 08:21
Behavioral task
behavioral1
Sample
2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe
Resource
win7-20240903-en
General
-
Target
2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe
-
Size
124KB
-
MD5
df24c49c66626e354e439fffd1cf4260
-
SHA1
ebc440e19c1437af7067ede2fcd45033ec0f9ddc
-
SHA256
2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bc
-
SHA512
9a76996e084fa2a3654673d2f2dc113eed2bfb64ea292e119c0e59af7c5abcbb2c9646399f55e05f0bf8d409f80d796856737d4ce9dbe539fe01b3ecb6910aa1
-
SSDEEP
1536:Ko6JdvxttIBcXISDPV2Mhg3GkFceersWjcd06UsfqW2vxq8un1zYL:iHC6D92O8n7eU06UsfUpq/W
Malware Config
Extracted
urelas
112.175.88.209
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2168 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 2400 biudfw.exe -
Loads dropped DLL 1 IoCs
Processes:
2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exepid process 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exebiudfw.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exedescription pid process target process PID 2104 wrote to memory of 2400 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe biudfw.exe PID 2104 wrote to memory of 2400 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe biudfw.exe PID 2104 wrote to memory of 2400 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe biudfw.exe PID 2104 wrote to memory of 2400 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe biudfw.exe PID 2104 wrote to memory of 2168 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe cmd.exe PID 2104 wrote to memory of 2168 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe cmd.exe PID 2104 wrote to memory of 2168 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe cmd.exe PID 2104 wrote to memory of 2168 2104 2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe"C:\Users\Admin\AppData\Local\Temp\2dc9dbcf659cff6762f59cf865553c7f6fbaaf3f10269f7a26e34ff46ff2f8bcN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5d8b6fb23d659bed3f6b1cf40a104e95a
SHA107c9c74af6b0fe9b78bb1b3aed5bdc1e0b5de952
SHA256f28d96334bf66f634f899c800b4d5c6195bcf407cb073761f8a4f30a4061f136
SHA512e841cd9283c63a92395b4221492e2ae6b06d9c4108fcbbfe7d8a7928cfca405c14c0634a6388a4f18da3db611696ea797f9b825ed314d1640a17aa767593e412
-
Filesize
340B
MD59989ac27164ab8197226c14e781986c7
SHA170020e7a91f6126683ab43f79619427e86d022af
SHA256d8d7fc6b22bf2439c51077003212fa6a101813efb2cae035ecb68fef8ebb21d6
SHA512c6088267ef25aebf28101ff5330a1e63fe61717703902a347ec8d25d98a00abe39714a93fedc2b1ae18e07ced5554e0c76e7b7174e30cfd8b73758fbd820ef68
-
Filesize
125KB
MD516f8716e420fa5c651dda49d29a4d16e
SHA169a06322dbed36d1354e77084495d2c5f0a20bcd
SHA25623c88fc74ff3268d26cff44f205fef631c9d90bd00a1d69004249cb5370af263
SHA5123aedf72ec6b98a8794e3c21bcf87b06e8f8ce407ffe1e1869cc93e7237a90264145c5d723d5d2707a339cf2f575224081e2dcff029c147e84898956b7af7c120