Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe
Resource
win7-20240903-en
General
-
Target
6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe
-
Size
328KB
-
MD5
7646c1e5540b53630c342928851a28c0
-
SHA1
9b239e2e0d68cfe01f5e21d20f6d7d41bf41ef2e
-
SHA256
6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212
-
SHA512
95a237a843b8872cccbb10054d12e890dadd2d9d282986591626bc3be4eb5ede3e21dd2518c88891328ed99ac9fab1e22bc5659d4ccc142df84c91616059e1ba
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYMOj:vHW138/iXWlK885rKlGSekcj66cis
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 848 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2364 qypyu.exe 2756 rikux.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 2364 qypyu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qypyu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rikux.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe 2756 rikux.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2364 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 31 PID 2080 wrote to memory of 2364 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 31 PID 2080 wrote to memory of 2364 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 31 PID 2080 wrote to memory of 2364 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 31 PID 2080 wrote to memory of 848 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 32 PID 2080 wrote to memory of 848 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 32 PID 2080 wrote to memory of 848 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 32 PID 2080 wrote to memory of 848 2080 6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe 32 PID 2364 wrote to memory of 2756 2364 qypyu.exe 35 PID 2364 wrote to memory of 2756 2364 qypyu.exe 35 PID 2364 wrote to memory of 2756 2364 qypyu.exe 35 PID 2364 wrote to memory of 2756 2364 qypyu.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe"C:\Users\Admin\AppData\Local\Temp\6c11808e9d31364c67d2e83f0a8ae811af9215080eacc55a5a46e80452bf3212N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\qypyu.exe"C:\Users\Admin\AppData\Local\Temp\qypyu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\rikux.exe"C:\Users\Admin\AppData\Local\Temp\rikux.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5b3de8c3cbc5365cca538e677c4951db5
SHA1088067f953683a8de15d76251021c4bea47a14b7
SHA2566fdff3846b767e3e609cd86f595522b7be7c6477a55c482a83a8b8560e895bab
SHA5127f8d66df21ac9fe781243a9d58f14a732cdb995aa2e1734e81fa018fbe9e374de6d56b473a3e4f67a14ccdefbd79c57fdd6292599346bcd70942e22fa667f0e4
-
Filesize
512B
MD518b667927503dab3e0e867adb565eb6d
SHA13c367b27cdcea77aea295080bc78e35c1b9dc53b
SHA256b3f76f396b5ef36a97d0ca747fa0b01584edbaf28f48a5882b287dbd35457fd2
SHA512963d7355ae3b55d90b38cf403759342b10197d9bc924b2997d7ebbfac6ea739eef894788f5433ee19de16013f222c0618e46d15e0357e37fbe7ad5b576793f09
-
Filesize
328KB
MD55753fcf734d7752683de409950dbda8c
SHA190b66ca853efb9033a013884c2528f8b02ffcb00
SHA25607fedc02fe92b7869da51fa047e58c33cb8b59a40f1d90ee8fe9b82eaf0c2005
SHA512338f1b427294e5476d4d4f99177f9aaa3de6efde8963b6717354535061fec834974ab559a8fc777f5dc868fcc9221c0a40f81ca45e2886bcc62fe36236911bf4
-
Filesize
172KB
MD54aa413bb1ae670f7a95c6a94932c8111
SHA1545aa39e8d438ecff541c1383946a4e263355bdf
SHA256bfa86f91f12b3ab4530253da0a5dc792feee3506922ebd12c49771d4aca85dea
SHA512e5911a8cfcb71e1692e8ea7ac9d50275613e8c99c2bc951c2667572a0b87351f737ea96dc70c840b82eaebbbe4d177193759b2a146cb65d9a942be2792d4bcbc