Analysis
-
max time kernel
119s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 09:59
Behavioral task
behavioral1
Sample
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe
Resource
win7-20240903-en
General
-
Target
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe
-
Size
331KB
-
MD5
a19061efa0ec169b8185848b9cd64970
-
SHA1
a66e713f8e8a839ea26521c0bd919f3bcd3b9c34
-
SHA256
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9
-
SHA512
dca58cabf92c1eb225c87a7f377aae5a52cc081779567a5d042c2c174a3bc15d520df8e45afd5f5d051437dbb3a59e4a2a4b4f82f5c8154b0470687804883b8d
-
SSDEEP
3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZisn:Nd7rpL43btmQ58Z27zw39gY2FeZh4A
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\fifyd.exe aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2008 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
rufot.exegenooz.exefifyd.exepid process 2236 rufot.exe 2648 genooz.exe 1456 fifyd.exe -
Loads dropped DLL 5 IoCs
Processes:
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exerufot.exegenooz.exepid process 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe 2236 rufot.exe 2236 rufot.exe 2648 genooz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
genooz.execmd.exefifyd.exeb4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exerufot.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language genooz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fifyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rufot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
fifyd.exepid process 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe 1456 fifyd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exerufot.exegenooz.exedescription pid process target process PID 2464 wrote to memory of 2236 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe rufot.exe PID 2464 wrote to memory of 2236 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe rufot.exe PID 2464 wrote to memory of 2236 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe rufot.exe PID 2464 wrote to memory of 2236 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe rufot.exe PID 2464 wrote to memory of 2008 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe cmd.exe PID 2464 wrote to memory of 2008 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe cmd.exe PID 2464 wrote to memory of 2008 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe cmd.exe PID 2464 wrote to memory of 2008 2464 b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe cmd.exe PID 2236 wrote to memory of 2648 2236 rufot.exe genooz.exe PID 2236 wrote to memory of 2648 2236 rufot.exe genooz.exe PID 2236 wrote to memory of 2648 2236 rufot.exe genooz.exe PID 2236 wrote to memory of 2648 2236 rufot.exe genooz.exe PID 2648 wrote to memory of 1456 2648 genooz.exe fifyd.exe PID 2648 wrote to memory of 1456 2648 genooz.exe fifyd.exe PID 2648 wrote to memory of 1456 2648 genooz.exe fifyd.exe PID 2648 wrote to memory of 1456 2648 genooz.exe fifyd.exe PID 2648 wrote to memory of 2032 2648 genooz.exe cmd.exe PID 2648 wrote to memory of 2032 2648 genooz.exe cmd.exe PID 2648 wrote to memory of 2032 2648 genooz.exe cmd.exe PID 2648 wrote to memory of 2032 2648 genooz.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe"C:\Users\Admin\AppData\Local\Temp\b4b89f29c68b5ee55bcd9e33db0abb2ab5a1c9ca787ccbfbf7790974c1f0f7b9N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\rufot.exe"C:\Users\Admin\AppData\Local\Temp\rufot.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\genooz.exe"C:\Users\Admin\AppData\Local\Temp\genooz.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\fifyd.exe"C:\Users\Admin\AppData\Local\Temp\fifyd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD55e89e6d675c60a47ed8e6a7e0a424109
SHA14bfa84c0181591fb336eaea476094a9e385abb17
SHA25633396f80da0f4e3789ef789a5ea42c7d1db0554140c9a2881aca5f0abff707c1
SHA512f406c55180a85b96498cd746ecfefa94fb50bc96cdc17492e5bd5356da6ce1cbac2b164890092929e36939cce37533b7e2072711acf913ada48d7311e650776e
-
Filesize
224B
MD5f6f6eb516e43f392a979a54540c30cbb
SHA1e2eea21a43fe267c706873009b2aed429540ae3d
SHA2563627f3a3ebd3053f7b0abe788008cec6025940e84ccc2e7ae8be93c902df1ed1
SHA512e42756eab10fde20489c46c630e42e54f666a2914b90773eef6a45639a04ffe5c2eb1d39eb2b30dfed8fb0812077ef5f386e436129b519bd04d326c19f2220a0
-
Filesize
136KB
MD53bee509a4077ec8b36ff8de6766afd5d
SHA1a088576e4df26c2542302a85c90635515171b6b2
SHA25686272924242d1dbb0d4a51762bbf08bf38f0929221886c703e9c2f5f5887525f
SHA512bbe9ac49295a9f7033f744c9b2f7878b530bfcd05c0164a4d4c8202a2ece8e6d681795b8628559add8e3bbe6ebf043bab4280a988c8a559cf15e3fce7f9b2a5c
-
Filesize
512B
MD5aeaf2735823598158243be761aa7bef4
SHA1bc75ce4897095b01689bd29eb1c528d22e4a23c2
SHA256b9f52f33d1848eeef052469bab97acc2c59eec6f59faa7eec97ebdb837411597
SHA512cd71768be33f3f1b60570f74da3634be5d3e793411716cf87b7b556a768209e0b4977c06d108164c942c1c792c7b2f8f937ab498759bb0007854ceb7a9e70490
-
Filesize
331KB
MD5c62dec2e3fc335cc54bad917c2a73608
SHA1c53c9ae6dc35edbea22147b82a0f823a4900216b
SHA2562689e8753cfcec246058fe954f4262ac629865330c5d5dc00cfd16d27b354cf9
SHA51250da02f15fec2a6f9f8fa92e84b579c153e4828c6dde6cd3f524e5afacf5d9d4ebb2fe712c788e63be15d803e620d9eaefca015134f6563d4fee37757f48393d