Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe
Resource
win7-20240903-en
General
-
Target
f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe
-
Size
325KB
-
MD5
eab16fabf805f96807856a0c861691f0
-
SHA1
03ea520ecbb5f02f97319c69a6c733d03d4fb2c1
-
SHA256
f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ce
-
SHA512
2b8cf1ba430c18afb23b7ccb66d6f5ff999714d06437c363d306a220892413ee73f1b2053620fe55ee6c5cbf6033990037723ae3dc58d29ef3dd55eae0e24388
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYI:vHW138/iXWlK885rKlGSekcj66ci5
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2484 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
kazih.exegaqyc.exepid process 2068 kazih.exe 2680 gaqyc.exe -
Loads dropped DLL 2 IoCs
Processes:
f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exekazih.exepid process 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe 2068 kazih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exekazih.execmd.exegaqyc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kazih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gaqyc.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
gaqyc.exepid process 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe 2680 gaqyc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exekazih.exedescription pid process target process PID 236 wrote to memory of 2068 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe kazih.exe PID 236 wrote to memory of 2068 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe kazih.exe PID 236 wrote to memory of 2068 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe kazih.exe PID 236 wrote to memory of 2068 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe kazih.exe PID 236 wrote to memory of 2484 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe cmd.exe PID 236 wrote to memory of 2484 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe cmd.exe PID 236 wrote to memory of 2484 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe cmd.exe PID 236 wrote to memory of 2484 236 f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe cmd.exe PID 2068 wrote to memory of 2680 2068 kazih.exe gaqyc.exe PID 2068 wrote to memory of 2680 2068 kazih.exe gaqyc.exe PID 2068 wrote to memory of 2680 2068 kazih.exe gaqyc.exe PID 2068 wrote to memory of 2680 2068 kazih.exe gaqyc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe"C:\Users\Admin\AppData\Local\Temp\f674a1c3b87a10f9a0ffcb6d23ac8425230718fc51e1d353e40da9541a7b70ceN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\kazih.exe"C:\Users\Admin\AppData\Local\Temp\kazih.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\gaqyc.exe"C:\Users\Admin\AppData\Local\Temp\gaqyc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5ebdf1267d2e6846a1f521c8f1b6f74ca
SHA1219b98873404f0a8ceb431fcbb903a317f23ab28
SHA256055aedc76fce6d5aa59a0768f1e6345449751ebfa6c393f5399b3ffc805648ec
SHA512449066aa1893658791bfb9b41aabcbaa1c0506041b062abda45c251d94f90478d533796f8352d3edd1bd4d0caa5c8044a8d4a539967315715eca69ca0614a669
-
Filesize
512B
MD5b8c6461814b0b5888f20bf3bda2a17d9
SHA14f3520b222d244a5ae5b3b8069c7ab821634713e
SHA2562892c9d45456babe8fc2f1176bd4277ba47a21afc6e606c95cf621260d99fed2
SHA5127a630c6498f7d824aa8a967fbe8944f3ccc20e43efe69f4b92318d26e283130bd65a959ce8a8cb948f7594f1cf90cafd41750537a49582a96bb8081429299060
-
Filesize
325KB
MD5f5beb6c645ee2d3dc5e00f157a3f15bc
SHA1322ddf514a944b6a30d9a4f82c3ee7176d9846c9
SHA256bd9e0bf7dcffa48a991835e13faef95c15cb85f25a432d56e2f6a5af26183dd1
SHA5129f21f74434335b1e5c72beabb75ba569ec35ec9e172be808da1df823132d8fcef5f4c806a5065006013d226ce08c3c13c749654c0608bdee0047df17f71c14fd
-
Filesize
172KB
MD53f74b3cd475f4e460fc4811b293bf91f
SHA1ab1a7e833b526c4188bb98887f9474083a1f117e
SHA256f5e6c00dbd5ad0178a7d531f56acd4f2b83ed14b34eef65d6cc5dfbf87f37613
SHA512215cef111ede7ccc9f20e64d44ad524e67bcc1759099a2c9e8e0018c0789fbc6c17d59c72bb0da62e33f6aa2b6446f04a0277dbe571c7110f80b3092d12e85ac