Analysis
-
max time kernel
119s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe
Resource
win7-20240903-en
General
-
Target
a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe
-
Size
335KB
-
MD5
32b6decf1f8f55af9dc2a48997ebf910
-
SHA1
b19a9b5476ec7afa01a63083dea8961119652928
-
SHA256
a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482
-
SHA512
d2a82fae0b0621190260475b39f2d040cee0c25f302f5a4f60c164accfdad26d07b8df1cf408588f93769a1b56d12aa167200ef9880795794dd6d669ba14dced
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYB:vHW138/iXWlK885rKlGSekcj66ciA
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2332 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ryqox.exexaajn.exepid process 1984 ryqox.exe 1688 xaajn.exe -
Loads dropped DLL 2 IoCs
Processes:
a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exeryqox.exepid process 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe 1984 ryqox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ryqox.execmd.exexaajn.exea50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryqox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xaajn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
xaajn.exepid process 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe 1688 xaajn.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exeryqox.exedescription pid process target process PID 2504 wrote to memory of 1984 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe ryqox.exe PID 2504 wrote to memory of 1984 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe ryqox.exe PID 2504 wrote to memory of 1984 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe ryqox.exe PID 2504 wrote to memory of 1984 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe ryqox.exe PID 2504 wrote to memory of 2332 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe cmd.exe PID 2504 wrote to memory of 2332 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe cmd.exe PID 2504 wrote to memory of 2332 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe cmd.exe PID 2504 wrote to memory of 2332 2504 a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe cmd.exe PID 1984 wrote to memory of 1688 1984 ryqox.exe xaajn.exe PID 1984 wrote to memory of 1688 1984 ryqox.exe xaajn.exe PID 1984 wrote to memory of 1688 1984 ryqox.exe xaajn.exe PID 1984 wrote to memory of 1688 1984 ryqox.exe xaajn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe"C:\Users\Admin\AppData\Local\Temp\a50e91bdcc42084065dadf56c3738ba142d537147fdef38db2f05713aad27482N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\ryqox.exe"C:\Users\Admin\AppData\Local\Temp\ryqox.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\xaajn.exe"C:\Users\Admin\AppData\Local\Temp\xaajn.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD59a048aa325b4689fdcfd1e04de51f69b
SHA15072d2a39083b15bceb55a02483f35eda0ad9150
SHA256e99675057f0b5161be35b2ee5baf34c89f00962c77ab2307860014e46e890727
SHA5125e66b9da190a61c7814fc2961f6135a15a53a975fb2fef3cd1957cbd9541c4b8acaf37bd0ef479e7be898813460692a02c4618d8de699a166365e11b15d3ac8a
-
Filesize
512B
MD567ccb55224e4e7c039ff6de5220ebb64
SHA1cfb95faac96cb0526e3215c50fe8ac25c2de79ac
SHA25670a5ff3f55f9af1f87b79dbd97751f8a3b95e6121735988360ee9fe1a42b271e
SHA5127cbbc0aac00c54dd94b909e83dda469038c49df0298ff5543f082ee94493197608afeed1c1f5ea6ac7a0fe1916ec9466da8c863cd6ad4ebb078f24af915a6477
-
Filesize
335KB
MD57224798dac1e11fda079ecfa9f0b85eb
SHA1910b915f1a1efeb2cbef762b895faa59a426f380
SHA256d9757f0ee0930a497f1183d615ec91ebb80b7a8f6f5653ed1f8bd0d9e04e6251
SHA5128b57a2bce87ddcbb3655a10769bc7a69eb47713ed6ad0ba963eadb30c959ab5d6b81ddb13c6e4e1cbd4bb7c3fbc98abc7bbd70a5f87da2ba6806a183466e11d7
-
Filesize
172KB
MD5408d9e20d396efbe81238c5bccc24256
SHA18defd9a21914a954fac93242526950e39a3241c4
SHA25618836bd49809c19474d70329b2ff22820cc461dc04dd733f421589b525c345b4
SHA51233ce6dd211a1f45b68dca2674cc188a693aee3d07a28dbe9ce3ae068670569b3f00ce88ddac0f551e90531f1fc0dc1e85c6f501bbff38b353e7747365e0b45d4