Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe
Resource
win7-20240708-en
General
-
Target
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe
-
Size
334KB
-
MD5
7a181789d0257b40a159ab4696ebdd80
-
SHA1
5ba1408568657c069093a923ec223f05c1465789
-
SHA256
51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804
-
SHA512
0873dbad88af0dfdceb5161ec1eaacbbfaf690676cc1743b037a2fa80fad0a6f07c51df8df54ff7b66666fafaec6edb890c40464c353ac49a4a2ed66f51f849f
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYPT:vHW138/iXWlK885rKlGSekcj66ciK
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2464 monem.exe 2064 azbur.exe -
Loads dropped DLL 2 IoCs
pid Process 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 2464 monem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azbur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe 2064 azbur.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 784 wrote to memory of 2464 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 31 PID 784 wrote to memory of 2464 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 31 PID 784 wrote to memory of 2464 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 31 PID 784 wrote to memory of 2464 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 31 PID 784 wrote to memory of 2780 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 32 PID 784 wrote to memory of 2780 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 32 PID 784 wrote to memory of 2780 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 32 PID 784 wrote to memory of 2780 784 51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe 32 PID 2464 wrote to memory of 2064 2464 monem.exe 34 PID 2464 wrote to memory of 2064 2464 monem.exe 34 PID 2464 wrote to memory of 2064 2464 monem.exe 34 PID 2464 wrote to memory of 2064 2464 monem.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe"C:\Users\Admin\AppData\Local\Temp\51e2e0562467ed45d951ae561eb5b189273cc13b37c20b1a2b941ea28b61f804N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\monem.exe"C:\Users\Admin\AppData\Local\Temp\monem.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\azbur.exe"C:\Users\Admin\AppData\Local\Temp\azbur.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5dfa98e3c887f69b92ca241f39102d10d
SHA1bf08c1c8e7394cca6ac430e7e4ea89c9f1e21f47
SHA256c06c318b9f96a11467e5201b10e26f75259e81fb12ad11b1c9adb80ab4b43bfe
SHA512b323d649e87a395e67958f54835a9f4b6794bb4a80da7f19612c78bf9fe77d801e185380da1ee2e9340e60292cf1f7857d97d3e235125bd7c238f5aa47c8b287
-
Filesize
512B
MD52d915a0dd9948785887be976e323a820
SHA19268af0a9473f5c07f08018ff0644bd63df37146
SHA256559c49011dc4936378fc5598b480b3173ae56ccf3f4f353a6bbd2bd568987167
SHA5125601525220aaaaf6a5672255fe0c20d4c02bd2702c6a6925bae0eb3e5942c37776e9225a2b1909f41e6c86eaf9fe23ec5d1ef8fcc34b7c5c6fa01ba41c18f1ac
-
Filesize
172KB
MD5cb35856edbcdab72bb169f88be1d1087
SHA1b0de4edd98dfc7885f54263d498b2978ec72c852
SHA256b87c6469b59d49f29c505f9320a817bddc16c4da31b07a5ba300e06abc50808f
SHA51235cb31794b7454dcb7aada3f91ec94e0d78581bcf2fae4de4ec9fce1e272cf87f15e0430398e9549e752256a55ad829f392abde606c8c8dc73e21ff8200c438c
-
Filesize
334KB
MD57e504cbc255b173e04bd10772000347a
SHA1ade99357728e7bcece7d9bbae31464283a54239f
SHA256a764388374ade189a62e8830e1ea5be4c25e7e057e7124f720a625b5e2bf40fe
SHA5125560333823853b564a9694843b9fa29f1dfbd0e6cd261fc4c7b517f2649d63e0a67248be5549ecd13b7cb3d4c4a89c8491981123861e78215d27462fc21044ee