Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe
Resource
win7-20241023-en
General
-
Target
b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe
-
Size
332KB
-
MD5
1024d773fc47520c1454b600cdfee860
-
SHA1
7cb1ce05b8c60995daa64416b925426f139ea134
-
SHA256
b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1
-
SHA512
60a3f88d1c6403e58d391bbb9534b06aa5c928b1fea3d62b39927dda85f4186b59b6b3ee709bcc8339ba2309a969fe3ecd281e43877068069c5f5391704e6a7c
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYi:vHW138/iXWlK885rKlGSekcj66cij
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1316 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2332 dofij.exe 2680 nozuh.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 2332 dofij.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dofij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nozuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe 2680 nozuh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2332 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 31 PID 2036 wrote to memory of 2332 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 31 PID 2036 wrote to memory of 2332 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 31 PID 2036 wrote to memory of 2332 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 31 PID 2036 wrote to memory of 1316 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 32 PID 2036 wrote to memory of 1316 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 32 PID 2036 wrote to memory of 1316 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 32 PID 2036 wrote to memory of 1316 2036 b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe 32 PID 2332 wrote to memory of 2680 2332 dofij.exe 34 PID 2332 wrote to memory of 2680 2332 dofij.exe 34 PID 2332 wrote to memory of 2680 2332 dofij.exe 34 PID 2332 wrote to memory of 2680 2332 dofij.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe"C:\Users\Admin\AppData\Local\Temp\b65676947ea69cec6ae7bbd2a4cacef7b9992dcf50e0ffde097928f92486dec1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\dofij.exe"C:\Users\Admin\AppData\Local\Temp\dofij.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\nozuh.exe"C:\Users\Admin\AppData\Local\Temp\nozuh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD504a7bfa8eb94ca946e1a890cc85ebfa6
SHA1f9cd3e2f86e97ac420219e2fba3787684910607f
SHA256a25689378fb74347ddc425110ed6f13f5a10787ba1913001946839a8953a972d
SHA512b7fda068921b8ceebc1a74afd9a5e1ca9e3fbc60b9054c92afe9fa88293561894ef67f8e7cbe8abbe86bcef98350a803b9450eb6cf051b57433a4d4b6b67bc7c
-
Filesize
512B
MD5f3b9f646776b9e716dce384ec23ad694
SHA11434d99e3ee3dc3d773836d2736e35728c3c1791
SHA256e48ae4c57048eea62de2e4c041fc67fd28c0042e36a6c8c0c8cb8575dd9c5e53
SHA5121566211d5910967599b5272b9f39651298d11798223d32b5fd76b4fc6124219faeafa5c34eaef73784e6124ea9bce4001c77a6a23bc8b459e0bfb66689e0af74
-
Filesize
332KB
MD52a88523114b54028ea9a8c0c795b617c
SHA157d36ce18294a22b8c601b61ff402768b71abba5
SHA256d1f530610db7e90675ad45fbb333fbc33621dd9dbb20171b4f6a95871b12385e
SHA512d8754ec6d1f5fe1adf8afbf74ae3b10c2e1d27d61ff3f7f6a5ac7415fabde7f8cb642d54789d40a45e7037e9a7de1dd77a7018e564f0bf291c5514a3b7ca021a
-
Filesize
172KB
MD5c072b362f273091bbc58d5e900472477
SHA10aefb73700846c82cbc3e90091e8cd49e06af506
SHA256c92fbd7a97e4d457ef5f4f803371b98f076f68153651c77063d5f97692af3ea1
SHA512263bb4a5f47b6376445c78c60d9f56791e85a54fc711bd54aa451efa38678208a3516a1731f67824ad822a4dec447b8aef690d28698ea637b756a5bea34e317a