Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 10:39
Behavioral task
behavioral1
Sample
c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe
Resource
win7-20240729-en
General
-
Target
c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe
-
Size
169KB
-
MD5
547433b1c994e7537f4849297fcca790
-
SHA1
d7c44fbca8f6516b04243c11936ad08a4067cdaf
-
SHA256
c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179ee
-
SHA512
6ecc131cbef5c3af4022e7cbf01e951f7bcb6808445e88c5f2f5b5d1bc9e57784dfe2b6487d90b6b9ace6b5482822c0514ee82b383eddf980fbebaa7408dc78d
-
SSDEEP
3072:yp56zRJ83+OJ7NoGvdwWy6k04yW/KR0Yx4BXPC:yOzRWu27dlOd5/YWVK
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1664 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1664 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 29 PID 2172 wrote to memory of 1664 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 29 PID 2172 wrote to memory of 1664 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 29 PID 2172 wrote to memory of 1664 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 29 PID 2172 wrote to memory of 2648 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 30 PID 2172 wrote to memory of 2648 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 30 PID 2172 wrote to memory of 2648 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 30 PID 2172 wrote to memory of 2648 2172 c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe"C:\Users\Admin\AppData\Local\Temp\c58a54e493ed28635efc5218a3830a3ce759603e7e9ab3a15b625b51281179eeN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD58d09ea4f866065b68ce0dff43dd3eb42
SHA1bceef0ea07693fe2a2313c7a5ac5a210fb364192
SHA256eba4dc76ab9b00f5477235688f50db9304b3e2e70bde11348be0cd786412e528
SHA51255aabbc1c1a62a17026a8b195f97c38436bbf81dbe00deddf3c8f06110a6ecaa773819fa2f0d08f9352969fdf96832aa4704d6a3b6128b6dfad3361c56492292
-
Filesize
512B
MD5ac5e84ed8031d66a9fcd5e472ba8091b
SHA106303add604104d6abbb69458f89773c066b470c
SHA2563a3cfa6f4786dab0ac8bc76204948f32a3a2cbd094922f87c251ec80d22baae5
SHA5127bf829102a70a1304dae435b8ae3c9ef9a925af7e995fe381d80730f4f702e1fd2a0a1b6a3a4b4667925f5bb95c897166a8fc0f52d3171d9cdba0bf09b53f152
-
Filesize
340B
MD5545c61b864f4e47ae8805a5e0584ccd2
SHA19b1c6cbdd7724d70f56c44a9246cfa40636c2200
SHA2561283afe8f96a4f3a6cb1addf857e99bb3d01cc5b32289fb6ff681d62783a9164
SHA512dcfa377eb78d33df344a5f28b0194a24eea091e6dbf436d3c8258e24021b1719bf72402b235848695568f2ea59f20321e4c96fe3d0484a64e4aa3f767edf8f12