Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 22:36
Behavioral task
behavioral1
Sample
c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe
Resource
win7-20240903-en
General
-
Target
c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe
-
Size
413KB
-
MD5
b9f8bd887d225686446883ff875ccb90
-
SHA1
67090bd9de9213f1c08a0f400dd12925cf05daba
-
SHA256
c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8b
-
SHA512
f33bf21f154ed5de651558ba377b993bae2e9bb376f0723320ccca8a7825a9fadfbd657b906e8c276311c097882a3fdce4ea83b2ab4e2274b0132ab34a9ccdfe
-
SSDEEP
6144:tzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODso:hU7M5ijWh0XOW4sEfeOT
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0004000000004ed7-26.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2964 upfep.exe 2032 adwos.exe -
Loads dropped DLL 3 IoCs
pid Process 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 2964 upfep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upfep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adwos.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe 2032 adwos.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2964 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 28 PID 2408 wrote to memory of 2964 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 28 PID 2408 wrote to memory of 2964 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 28 PID 2408 wrote to memory of 2964 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 28 PID 2408 wrote to memory of 2684 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 29 PID 2408 wrote to memory of 2684 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 29 PID 2408 wrote to memory of 2684 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 29 PID 2408 wrote to memory of 2684 2408 c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe 29 PID 2964 wrote to memory of 2032 2964 upfep.exe 33 PID 2964 wrote to memory of 2032 2964 upfep.exe 33 PID 2964 wrote to memory of 2032 2964 upfep.exe 33 PID 2964 wrote to memory of 2032 2964 upfep.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe"C:\Users\Admin\AppData\Local\Temp\c50503812cd070efc167c8958b9b97e985e55737f6d766c7b9685709504d2a8bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\upfep.exe"C:\Users\Admin\AppData\Local\Temp\upfep.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\adwos.exe"C:\Users\Admin\AppData\Local\Temp\adwos.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5ef67289238daad92202b4c1fe4097f4f
SHA1f71429724fe3c800d9b15077a0c28ebfed067caa
SHA25635ca3054a3a03ae562b1270445ee4a7851c04364248f84b4feb4cd77f6502659
SHA512500c3849490cce085e27ca20d7d46394789d0b39e64aa56f72772704bcd3820c431b02607e13fcbf966a11765c2d9281e9f7e0db9a88304363a3a5b9dc505ad9
-
Filesize
512B
MD55e88efba38716e6f4b8794d4151782ed
SHA15095f8c5ce2e3dd623824cd35f86f22a83ba5042
SHA2568b313690353075b796a804d5533eaf6ac8b697e20672fdac222a335301541a13
SHA5127e81f32c62b01820ffa642eeb02f374d977b9b7abf1f9ce9171e74af418aeeb0b160891c0b964309ab32693eb45cab89c83c885f48cc16bc862ebf9b7cce4f8b
-
Filesize
212KB
MD550077805c2949b715dfdd01dad11d7e5
SHA17b573227b56f320c42fd580e3b445392d43ae8dc
SHA25684c083e70f3d2c4715b414fa98bec0f56bd3b811e9f3b2e955c7ed7745b21006
SHA512e8eea000eb407f68e588ac36b90dadf0633b8bdd78d5c85e9be6a46e07b5c9ac32b8f165dd04294e0c7e4d717bc50ff14064d0b621c6f3c54abdc369c1dcfbae
-
Filesize
413KB
MD5bbb015eaab2b7b980fcc01f3cc2cbbab
SHA18585833c3b2c57fdc7eea2c04e26fd02be01c7e3
SHA256365a2273735af7680387dc09e5f67489d93bf5a89704f79abb5780e42085d8b6
SHA51218b71c3fb890d87c32aca53191cf7158e99f6f84585c558985962eff4d9dc144b4fac3e569cb8a08e55291194fa1d59af6930c36b3fd42cd59d3e6d30f7e8f48