Analysis
-
max time kernel
152s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe
Resource
win7-20241010-en
General
-
Target
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe
-
Size
6.5MB
-
MD5
897f9c7d871aa6cfee73a8a226b2ce00
-
SHA1
71a7b5a797d80cc76fb7dbc0d209eacb290ccc0b
-
SHA256
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e
-
SHA512
d668d0a14399ff53680d138ba041e6fff2cf36241588d42aedeecab3095f575d6579b6878224975f9b0c0f68508bb466a2efdf2ff5bd4924db9982e610f7d070
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSo:i0LrA2kHKQHNk3og9unipQyOaOo
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2848 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
luteo.exebovero.exeyhjub.exepid process 2428 luteo.exe 1692 bovero.exe 1704 yhjub.exe -
Loads dropped DLL 5 IoCs
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exeluteo.exebovero.exepid process 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 2428 luteo.exe 2428 luteo.exe 1692 bovero.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\yhjub.exe upx behavioral1/memory/1704-162-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/1692-160-0x0000000004320000-0x00000000044B9000-memory.dmp upx behavioral1/memory/1704-174-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeluteo.exebovero.exeyhjub.execmd.exef5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luteo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bovero.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhjub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exeluteo.exebovero.exeyhjub.exepid process 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe 2428 luteo.exe 1692 bovero.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe 1704 yhjub.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exeluteo.exebovero.exedescription pid process target process PID 1268 wrote to memory of 2428 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe luteo.exe PID 1268 wrote to memory of 2428 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe luteo.exe PID 1268 wrote to memory of 2428 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe luteo.exe PID 1268 wrote to memory of 2428 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe luteo.exe PID 1268 wrote to memory of 2848 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe cmd.exe PID 1268 wrote to memory of 2848 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe cmd.exe PID 1268 wrote to memory of 2848 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe cmd.exe PID 1268 wrote to memory of 2848 1268 f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe cmd.exe PID 2428 wrote to memory of 1692 2428 luteo.exe bovero.exe PID 2428 wrote to memory of 1692 2428 luteo.exe bovero.exe PID 2428 wrote to memory of 1692 2428 luteo.exe bovero.exe PID 2428 wrote to memory of 1692 2428 luteo.exe bovero.exe PID 1692 wrote to memory of 1704 1692 bovero.exe yhjub.exe PID 1692 wrote to memory of 1704 1692 bovero.exe yhjub.exe PID 1692 wrote to memory of 1704 1692 bovero.exe yhjub.exe PID 1692 wrote to memory of 1704 1692 bovero.exe yhjub.exe PID 1692 wrote to memory of 1720 1692 bovero.exe cmd.exe PID 1692 wrote to memory of 1720 1692 bovero.exe cmd.exe PID 1692 wrote to memory of 1720 1692 bovero.exe cmd.exe PID 1692 wrote to memory of 1720 1692 bovero.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe"C:\Users\Admin\AppData\Local\Temp\f5dc624fc92e2e1e175943520df30ed2ea5cdd1061f143e49625a54066462e2e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\luteo.exe"C:\Users\Admin\AppData\Local\Temp\luteo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\bovero.exe"C:\Users\Admin\AppData\Local\Temp\bovero.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\yhjub.exe"C:\Users\Admin\AppData\Local\Temp\yhjub.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD59254c976ccde302c429d767f55f7f19f
SHA1c71a23efe159e5ea85fea5a2cf6afd8e1517cba8
SHA2566f0798d6844c1c3cb90c8f0c42a9144e0e16554c3b9c9ccc1ffcdf1532fa5266
SHA5126f35f00e01a39281fe93cb1d9231a430c80a656ef28e336632f1f831dfc45464b1c2a4392872e5d0c7804920ad3787b74ff76fb22c6de986896907945b08d66c
-
Filesize
340B
MD599c774238dde8dcabbcbd9218b3186a0
SHA1db3cc894f3457dd2a28d2bf15c63159c4c8b634e
SHA256cbe3415c7e081687de8473980ee98e6271e9b9fc9a07c91d1ea3858ba29b270e
SHA5126863c40cd29af1e5074269dbd77e493ebc527a4e065166a55abeee892cbf121cf22cbda37f5cf3f92e4bcf1a86b82db95f0312f51f1e69482570b9b212bd6430
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5dc39f354c009258f49e888603b2b8c35
SHA161512da47ca3fd4aa87cec50b26619f31a1b70c5
SHA25635c422bd6d2286e4b71153f7c84e3e3cf280079145e274a571b9ab4dfa090504
SHA5125b06942a1d6a0c85e15e94c02e244045043eb128bf48ee1e0b550e727cae1b9cb5f3fd5828b4147ce133b1f2d9de0052f1642a38ecdc34ffb73e3d76527ac97d
-
Filesize
6.5MB
MD566403b50b0c6500c1b7f4586ee9b1a2a
SHA1a67130fa66ec77b7f8b3d58427eca9e138ab2a9c
SHA25618e10a98ef453760568ea1ed2b8226ce4432b7d5ede5a6218c7889ef38562cfa
SHA512b315ddf7fb53fc88fafee85aa6aeb17ebb30aae7bad1fa0410b9cd09cd5820ceae6bd496afcf10b12a34efce5fef12d64931b95dea7ea4d01ba2ec3d65dd8a5f
-
Filesize
459KB
MD54d3134b18331829c0158fd8802534e0c
SHA12bcac2a928bb77e4170abe414eda846a82c4c1e4
SHA2561fd6bf6467563b1b44f0e5d389da98fe57ac560e76fb1fadf4b6545fd3ca2f9f
SHA51257b27f1cc7638173698c209f15ef8e9da4e43971c53f3529bbf35f922d3590d467863bd475c0c94ea9141c265874b4e5b10ee0051676aeb504aee15c5fcee159