Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe
Resource
win7-20240903-en
General
-
Target
2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe
-
Size
94KB
-
MD5
ee8a913f2854262030bddd60c19fb5d3
-
SHA1
8831086cbcbc6a8d29f47261a79ac113b19f714e
-
SHA256
2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb
-
SHA512
7e14a8fcf14cbcaf089b9d092f389c3501e1a03170eb8b56d44753ff7a7bc1627fc053a0b2779baccaa682ee58d25270074980419e86b383f7a9ba783168531f
-
SSDEEP
1536:nwhq8V9IpPf2lgiIJ4pivJnuNVueC39GdBR3M9cZ:nqV9MziU4piRun7C3CP3MY
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.209
112.175.88.207
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2812 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 30 PID 2752 wrote to memory of 2812 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 30 PID 2752 wrote to memory of 2812 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 30 PID 2752 wrote to memory of 2812 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 30 PID 2752 wrote to memory of 2644 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 31 PID 2752 wrote to memory of 2644 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 31 PID 2752 wrote to memory of 2644 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 31 PID 2752 wrote to memory of 2644 2752 2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe"C:\Users\Admin\AppData\Local\Temp\2b04c0ab05d5fe797909a880c50ba204171bfe8369d5f14adf5becdd40758abb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD502167b944a214fee3d34f9a7e356dc6a
SHA1ca5b3f38a7151268726401593eb35f9b67bdde97
SHA25677fcdadc9ba56daa81edb3f0ef876e38a8c7de56187c28c7d02992cd9e0a243d
SHA512c8976c66724d737105a66699673052d7bc7f1e1941c91e03f97452aaba714d35b1d55434e950b00c58626b8bcf16186a731cccc503b7ba08f080ead3eaca5817
-
Filesize
338B
MD57f5dda12490c1026b9d0348efc1091b5
SHA1d2b26de097e114d393a8f17eb19867c4e7294924
SHA256522354d54294b7f6e4e1e6321292d2cb66c13a6b36f460fb8287270dca87ef85
SHA512b37cb81c7ba92b8b94ccee0aea74f4d7d72f898130e7ca45a8d06977ba82d0af6b3bf2b4598c767d52718c42474b274ec5ae0ed7a5a2f5543eab93eb8df7c8d8
-
Filesize
94KB
MD504a83dc1e8ddbae408cfc80534b6e356
SHA167b511ec953928f21952239a15e71bf10908833f
SHA2569ed8850a8175cd70be7442a4d2bee531e6ad2a945e3345b38831ec82dcb2ea41
SHA512dab7c7f944d35657087f2685d22cb28450657f74b8a920afbe5e8b1f1b3b97cb7c68bfcbbdee1c643a69d07602f1415b18f2e73fb66d9fa73d7d417c066aec84