Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/11/2024, 22:03
Behavioral task
behavioral1
Sample
4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe
Resource
win7-20240903-en
General
-
Target
4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe
-
Size
426KB
-
MD5
e4534a106609e33002824af2f536a937
-
SHA1
29b956d5233e3b4f0b59382b53d798e1d1bce9df
-
SHA256
4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953
-
SHA512
4e9502bc121bfc303dbce61318a0d918d1850d5e1b1b2265ad0d524ffd2aec88a910919f7e644edbb3f8d8eaed66812259f6c6a1e78b29e16762b83e143f7258
-
SSDEEP
6144:WzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOdsc:YU7M5ijWh0XOW4sEfeOD
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0004000000004ed7-26.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2416 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1972 siliq.exe 1624 biwuv.exe -
Loads dropped DLL 3 IoCs
pid Process 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 1972 siliq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biwuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language siliq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe 1624 biwuv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1972 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 30 PID 3044 wrote to memory of 1972 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 30 PID 3044 wrote to memory of 1972 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 30 PID 3044 wrote to memory of 1972 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 30 PID 3044 wrote to memory of 2416 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 31 PID 3044 wrote to memory of 2416 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 31 PID 3044 wrote to memory of 2416 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 31 PID 3044 wrote to memory of 2416 3044 4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe 31 PID 1972 wrote to memory of 1624 1972 siliq.exe 34 PID 1972 wrote to memory of 1624 1972 siliq.exe 34 PID 1972 wrote to memory of 1624 1972 siliq.exe 34 PID 1972 wrote to memory of 1624 1972 siliq.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe"C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\siliq.exe"C:\Users\Admin\AppData\Local\Temp\siliq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\biwuv.exe"C:\Users\Admin\AppData\Local\Temp\biwuv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD52e41ec5d0baa4ef76a82c0b0b1d8f58c
SHA16f93c7490b59dd92ed58e1406c0f8bdd156cb659
SHA2568ee3c8ac0b8815d68bdc39a1eb9d95e253e74cbe6e482ae91511ccbe2dc8d548
SHA512d27a2f296e27ae39cea7c8b12051dd6fd68ab932116235417db540d59fdad12e5522df52065f52c7bdbd2d85cb696e4f517347942aca876b8fad35b42faf0063
-
Filesize
512B
MD5671a12a4110af3353387f82a65ce3e3e
SHA1b2407f18ecc8401d86c2f5be0748e75bf08b4ffa
SHA256896483b294f76ea2d11b9b2445a3722546af8df207ec612a110525e98f62169e
SHA512e247c96ce97ab8c77b9d7e7470cc2607ed7c5667f250b88b6363d16fa864d862eec3c96f5a85fce7061cff56b61e55ca89b00ab23f5ba26e020a8bca205aaed9
-
Filesize
212KB
MD5f19c85d005e9ba58cdad7f47856e512f
SHA1860f7d66e98ee7975ab0370b9f1d347707bd8101
SHA25649f3fba11f3662b37a3e3ee2dbfc7ee695a4222b36a1cc2f634819d59ff9baf2
SHA512d842cd497c97cc8636ed3587c89c281cbc87edd18238f3fc4aaf5e0d4d0a352888599c503dd51a628b092304ca6072567384e12a45d5002c89892b4ae006004b
-
Filesize
426KB
MD578d48a0e9b3194ac3ed1b618387796b1
SHA100f0e305d0cff58742232b50a30751fcd4fdaca6
SHA256f970ba8b2849bda0a0e43f059a925727df5ba7af8e84f84d3adbc644b390e398
SHA51206e4446df3400d6a0954a53cf9f86b9762798f3b3b68aefac1495d4fabc8600bd7675c13ebb412d76ab915335dfb7161c10c59456846ea89d065363874932662