Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 02:59
Behavioral task
behavioral1
Sample
7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe
Resource
win7-20240903-en
General
-
Target
7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe
-
Size
427KB
-
MD5
9f5a76606f02cc96ed2530eb6ba13c7f
-
SHA1
40e448fe4bba1f92069e518706a0433417a07c37
-
SHA256
7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5
-
SHA512
c39c57ed0dea297553a659187fd72c89a70dcd68b20830c89a22851919081e3a5c72ca7aeeeb1844116dd70783a179e7224188fcd96ecd5a5cec440bd24e89cb
-
SSDEEP
6144:EKbwhNxUjDVMytD2NkWuRk/oBmodd+sAaTmQo2fkKv:vANxU3VH1t19MsAlpXG
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0004000000004ed7-27.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2496 luibb.exe 236 cugio.exe -
Loads dropped DLL 3 IoCs
pid Process 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 2496 luibb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luibb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cugio.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe 236 cugio.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2496 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 31 PID 2444 wrote to memory of 2496 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 31 PID 2444 wrote to memory of 2496 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 31 PID 2444 wrote to memory of 2496 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 31 PID 2444 wrote to memory of 2644 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 32 PID 2444 wrote to memory of 2644 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 32 PID 2444 wrote to memory of 2644 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 32 PID 2444 wrote to memory of 2644 2444 7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe 32 PID 2496 wrote to memory of 236 2496 luibb.exe 34 PID 2496 wrote to memory of 236 2496 luibb.exe 34 PID 2496 wrote to memory of 236 2496 luibb.exe 34 PID 2496 wrote to memory of 236 2496 luibb.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe"C:\Users\Admin\AppData\Local\Temp\7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\luibb.exe"C:\Users\Admin\AppData\Local\Temp\luibb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\cugio.exe"C:\Users\Admin\AppData\Local\Temp\cugio.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD58f00f73dc2327194b161ef418fc93c13
SHA117b54cb67ce70cf225e7807ee1dc5eaf5c1412bc
SHA2560069ed5fe201679710c34e0ba7dc99358b5fefe1f6ed1fe3f446ea044e9f1e7b
SHA512b67f29190dd78ab220832fd9a7f4a1a7ad801593d29da13bf9ad5c5dea1a645aacf25bfb25e3dbd1b9ae1e7c0e5e9ed16950897ce755e2fd6e397a2b1cb03b27
-
Filesize
512B
MD526a66a62c45b86c08364e062264b1ef3
SHA10fd134a4ebaebcac771ae4eccb21cc5519ec201f
SHA256fe38b941ed7b10cc473c78f04b03de627e0cbdb42ca713d8c7daddd2c389193e
SHA512e31bd9585a4fb89381a1d5ac569d98bb63b84e4646f281c5b68b959f64bcf21221dcaf8233b531d9c2d4dfb56bf369c6c077c8ff50de7f0227d111bfceb2fd23
-
Filesize
216KB
MD503f146883694d51ada27ea3239781ef1
SHA1a06d13904b44215cd2eda399a39cb5225c9f1310
SHA256abe0a3b7140df7dcb604be8b0b7fcb28688b66bfd10ec887511991327723706f
SHA512d50aff6ccd8cf6694769c93aef089b47ac89d441bd2c49ccbbd6fdc6c412701dc51cb69c5d0b60b6b489c614aa0c5d4ae48f9ac4256a44f6cebeaa0f4922e205
-
Filesize
427KB
MD5cf28276e3825b05fb001595d07b130ca
SHA1530afa7e8ff8e89c9524613084e0515014da3ea6
SHA256228d191dc441f7ab594290976b6873f9f979d126a8f2430c265f0186107ba2ec
SHA51269871feeed588eedf06fa093633accbaff902cc9de77fa77594f6d2ca6f4a25a2eee5f1242aba0d803b48816848b4ae341cae85268aea871965caefec2ea7984