Analysis
-
max time kernel
150s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe
Resource
win7-20241010-en
General
-
Target
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe
-
Size
331KB
-
MD5
b2b46805c6d9040e35b03cbcc2291570
-
SHA1
1f8c09742e89bc1920b0996382875069a2699ed7
-
SHA256
228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799
-
SHA512
05b4587e1e080bafc8d6b1c5f373273e0601d9e73fcf20ad33c19721e1cee1b89b3ea57081e301adac512b9140a2ea3b088b4ccfa176ae627d0823e4b9413580
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVH:vHW138/iXWlK885rKlGSekcj66ciEH
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2920 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 afutj.exe 2960 neyvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 2804 afutj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afutj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neyvc.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe 2960 neyvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2804 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 29 PID 2792 wrote to memory of 2804 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 29 PID 2792 wrote to memory of 2804 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 29 PID 2792 wrote to memory of 2804 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 29 PID 2792 wrote to memory of 2920 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 30 PID 2792 wrote to memory of 2920 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 30 PID 2792 wrote to memory of 2920 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 30 PID 2792 wrote to memory of 2920 2792 228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe 30 PID 2804 wrote to memory of 2960 2804 afutj.exe 32 PID 2804 wrote to memory of 2960 2804 afutj.exe 32 PID 2804 wrote to memory of 2960 2804 afutj.exe 32 PID 2804 wrote to memory of 2960 2804 afutj.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe"C:\Users\Admin\AppData\Local\Temp\228dda6362c74b2d3bb06c974669db1868b3beef46c49d30c33b9b92d0e5b799N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\afutj.exe"C:\Users\Admin\AppData\Local\Temp\afutj.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\neyvc.exe"C:\Users\Admin\AppData\Local\Temp\neyvc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5321fde60b66c64c4701cb5b752f9d577
SHA1217bdea5ccb5a394cf3da4f6147192343f9e6dbd
SHA2564ebdee2fa534f770db37aca411d0ef97cd23540daf2f6fd39b4b73839571156a
SHA51275036d7a7aac9e4a51335c3901ba5157701ba8f0b81264c050cecabb73185643cf6f71545d4683413b88fcd794d666805655251584c5aa89eac76cf6294c833e
-
Filesize
512B
MD5f25c13b1486ddcf8951d05f0e7145fbd
SHA1a6e52b97cfd813136daa5879ca98d45b9fb9cf45
SHA2567cadd247591e5980c9c8cbfe115d1f09c607a3b527edf5460cf95821d8ad3031
SHA5127fd38e36fafff2b95b69d36299dd8381131316d75bd2fef115469bb9991383f9464fe8f32fe1b6851636100fabfd9d318a908fa7a0c993db2b488719b2c06366
-
Filesize
331KB
MD57d2a935d30e773b04e6377d52cff8c54
SHA1b363da09746fa15a2b45b9d8c615b59c852384b3
SHA256ec4f748713ca1fcb217ec556bd7fbddb288b944f1f2c05ccb969b7d2677c16f1
SHA512c50077e63531628f792d4a274f1b290743dc1783b050403c9e36e9bc8a01ea44f9990fd6fbbe498ff323981342ee93a5223662d181432d5ca08c40e08867b834
-
Filesize
172KB
MD5ca0db21eb6d0e09069db8ffd4cd51ca3
SHA1c9fe4efa06257be2b868773b9076dff370089b47
SHA256d7067354901de737c17ab2bb1f4b2ee923192a18476add8bf84da3cc4d7d132f
SHA512558291e4c082aef212eccbf7ba6d1fbdc0ed15305d2102601e0c49987a589500ce4ac4d3d335fa97a4a44c767757a6ac8b0ac7af56cd1b1effafe8e3497f0b9f