Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe
Resource
win7-20240903-en
General
-
Target
e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe
-
Size
51KB
-
MD5
661a249cf780d55198ae7370d5a3d350
-
SHA1
6281c61e873f5ab5b8646518000b22ee49e8beb1
-
SHA256
e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461
-
SHA512
6913c2a82b5f58dcbac78bcd2f4aee98b5ad6f302cfffc03b04bc6621f3aff60bab61927e9ee58335f00a0739b9b913c48316224dbdb0d0ab9d0d206fd89ff15
-
SSDEEP
1536:lVeVFl6sRsDnQi1Mek/pFRMfKaP7cFwQkXuJXqmrh:v23sD1vSP6cOYXqmF
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2012 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 31 PID 1320 wrote to memory of 2012 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 31 PID 1320 wrote to memory of 2012 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 31 PID 1320 wrote to memory of 2012 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 31 PID 1320 wrote to memory of 2952 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 32 PID 1320 wrote to memory of 2952 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 32 PID 1320 wrote to memory of 2952 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 32 PID 1320 wrote to memory of 2952 1320 e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe"C:\Users\Admin\AppData\Local\Temp\e617ae79347e23e7aca6ff543945f2a576b9cee0b59256602fb1def768b2e461.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD57c1d9e0f564b1e893792dcef5f902a27
SHA1f8ff96c98d41f1ce0a31d78f56796284c5e47e3d
SHA256c0b7315aed511cab0685b0bbbcfa2cb7f3e9c36e58f6d7f1576fad807800add7
SHA512ef6a5eccec808909c7317359908b6cb46e8e074aff903114988b00a237180606257545bd36e5cea9521b13ba19923cd768a3d701f7fdf391a4bd41cdec606fba
-
Filesize
338B
MD54eb3489a2bd663739ff06e13ba30140a
SHA1f7b7f6f27a6fe42f54d6d9b0d191442b2c1e5d03
SHA256e46fc0568d39dac756b92bef862fa681ae7f9a71195efc15c0abe85a9055f1e0
SHA512c4ad193bc78bee3c29979af4231b907f1bf3ddbc396e781fbf08af7f0e8ab76f68f66a61fb5204588da1b3e3f2435371932f7c01cbd9431d3930bce511b13a58
-
Filesize
51KB
MD5fb4ec44cba37d2eab36eb0cac05c57de
SHA19123f2ebf6f12bf749e35770da38736986030a38
SHA256f222e88639e976c334fe693cdc365539a3799037f9773055c1c00e7b28621d07
SHA512275c90203967cffb248aafc8c05bd709a5dce3fd6fc71fe83d063615c1b00bc3d0f77337a1f82ed73af96e580e8ce792d0fee9fe099ddff4b0242c9a3b9dcc8b