Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe
Resource
win7-20241023-en
General
-
Target
41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe
-
Size
55KB
-
MD5
a25ddf0fd1ed5c42d60a8b1fd7df0cd1
-
SHA1
c98951417f3117899f0c63a5097f9fe0a8f4d43d
-
SHA256
41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf
-
SHA512
ece28ec1ffff9cfe6d49d8846232606ab2713dd2fc3416bde8ae884297b025165d46899b67a129f05be122a63afd4b120d6f5b3107e11553c3e3ce881e1899de
-
SSDEEP
1536:qw788avzI+on+TqOK0cHMqtzMLvWsrupwnTf1GqT7E:qwda7KVr0cHneunw1E
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2572 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 1236 biudfw.exe -
Loads dropped DLL 1 IoCs
Processes:
41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exepid process 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
biudfw.execmd.exe41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exedescription pid process target process PID 800 wrote to memory of 1236 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe biudfw.exe PID 800 wrote to memory of 1236 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe biudfw.exe PID 800 wrote to memory of 1236 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe biudfw.exe PID 800 wrote to memory of 1236 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe biudfw.exe PID 800 wrote to memory of 2572 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe cmd.exe PID 800 wrote to memory of 2572 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe cmd.exe PID 800 wrote to memory of 2572 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe cmd.exe PID 800 wrote to memory of 2572 800 41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe"C:\Users\Admin\AppData\Local\Temp\41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD538372839fa41a1570029012b92b3add0
SHA1ff299c18d5e7822b4662ef4b695be84d293f2d5a
SHA256ddf7001465dd2731e54da2281a0558c1452ebdae4b6fc72d9836cb6270b8ac4e
SHA512715037f9edc6ed916ad0048ab41ee0f25defbf9aee7e2fbbfb6abdc74496646f48cfccc47213d0562fd52fb358b1e35e59a26f6aa40c5b3356383474975a73d8
-
Filesize
512B
MD50750e4580a3e9076e82bdc6ad33ba927
SHA1b1e526b3833feda0e3b0738c6865fdac6360bf07
SHA25674428e568204ea0d1c31570864cb96b1c2b672880f7575220957bf5fc2b24d89
SHA512303b2cb8e644b336d7bf0892eadc84b414afdc41216719721aa0cf27fc18ecea1a2e943f07813c41d55c4166e489f89ec61a4fcead679ed3de8b323ecb42a8d9
-
Filesize
338B
MD506d7bf5c3af0789f97d114be8ae5d33d
SHA1e9e2969b2fe545dfe2ca056a4a5b1f744f264bf8
SHA25682274b407242cb4c72fc273a23212f5a71bbc2724cc381beb8e3299831a565b3
SHA512c8cd2b5f4be0e5365fd1823fc31d6ff012a75f9f0b7e394e0054ff4a0d5316fcfba7be5251b828dbf35020a86a8fcabd0e1e129897cbe890f86e03032542c1cd