Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 13:14
Static task
static1
Behavioral task
behavioral1
Sample
0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe
Resource
win7-20240903-en
General
-
Target
0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe
-
Size
328KB
-
MD5
9f0430ad5afbdfc9393b309e8dcb4600
-
SHA1
8b267dd9c1942020c384001ac2d78b004a01a7a9
-
SHA256
0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2b
-
SHA512
7d2f152b90fae91c1d860843bca9c68adfbd22e90a49ae854d3be24489860941bec9aca5a865bd8731b391d48aee6cd56b391ffa3742c120fcc49760b60edece
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYMOx:vHW138/iXWlK885rKlGSekcj66ciO
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1544 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2364 xociw.exe 2372 viylw.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 2364 xociw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xociw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language viylw.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe 2372 viylw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2364 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 31 PID 1968 wrote to memory of 2364 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 31 PID 1968 wrote to memory of 2364 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 31 PID 1968 wrote to memory of 2364 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 31 PID 1968 wrote to memory of 1544 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 32 PID 1968 wrote to memory of 1544 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 32 PID 1968 wrote to memory of 1544 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 32 PID 1968 wrote to memory of 1544 1968 0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe 32 PID 2364 wrote to memory of 2372 2364 xociw.exe 35 PID 2364 wrote to memory of 2372 2364 xociw.exe 35 PID 2364 wrote to memory of 2372 2364 xociw.exe 35 PID 2364 wrote to memory of 2372 2364 xociw.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe"C:\Users\Admin\AppData\Local\Temp\0490ab2d204fcdd8d0e509ced3e2a107da76134fc61bbb64d3ffea58b901bf2bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\xociw.exe"C:\Users\Admin\AppData\Local\Temp\xociw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\viylw.exe"C:\Users\Admin\AppData\Local\Temp\viylw.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD591dbfb50cd89e689bda0178dea673ee7
SHA167c4021d0ae8deeff96b6047ab3b833a0a5800df
SHA2560d06820b387f55d4c9d241849b19dcce3b10d4250f2f46b07e7284c8b5f5e5a1
SHA512c8ff079a3cbf0de5a160559c011c43e839aa8f75770de527685318957808566a84f7f085792345945d577b8dd3e695c214b8f47554923a9141cc229d70e10edc
-
Filesize
512B
MD523891763e82b934025fd9ad7fcb1448d
SHA150424612d199723fc9f6d3fceeeed2eb8925ae7e
SHA25675e3b43e49eec32f98d0958aed1b769ce82df57765ad9db7c5b758c0015df588
SHA512a35a1835ee197008d5517164df33460e3f10308c0d4bd07db204cadfcbbbe1948a3ddf9fffb533da18d3d5bac0014a69443c457683c39f160cafb13e4ea925df
-
Filesize
172KB
MD5b68a70421e781ea8755cc31a92115baa
SHA18116cd488848f980f980b8a92e803a8a1a3fdf68
SHA2565bc78966004118e1f7fc4b7ca4d4b500fe5d3835f3b252b223f3e1005173935f
SHA5124027d159d58a63177782c85f335ac5f25ebe4bdef67d0d7fc3dc09084edede64acd19a89d141ce2521c0be53dbf975171e6ad8dbe9a8b635a23d098de2a182a1
-
Filesize
328KB
MD5230b316008e2a8f1e3c72354ef9850cb
SHA1302d6e55bc5d7eae999c937c1278a3959e386061
SHA2567b6fc28dc7504b77a8c1200a28a09aebc097619b0a9fa366a7d1d2bbaf9bdd90
SHA512c84831cfd58225409ce8d76c521ef20ea59756da9bffb8fd6dcc9dc707bcef5c4c8b42d062b730136273a9bf49cb700d91d7dd50083413bccf1618bd7dfd87d6