Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe
Resource
win7-20241023-en
General
-
Target
960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe
-
Size
335KB
-
MD5
31463bff05962a340451ade401cd245d
-
SHA1
2f12b72d85e2eb2aa69809c0e9f927d1049eb663
-
SHA256
960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940
-
SHA512
e2268a4f9aa86667dc5e1dc832545eed8bcdfb36fc16673a7fb6262ab12e110c74777929787cf266f4cccb53d9f8bc820bea18aa7b10b4819d030a629762b2b3
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYB:vHW138/iXWlK885rKlGSekcj66ciA
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2596 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
kydoo.exewejeg.exepid process 1040 kydoo.exe 2768 wejeg.exe -
Loads dropped DLL 2 IoCs
Processes:
960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exekydoo.exepid process 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe 1040 kydoo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exekydoo.execmd.exewejeg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kydoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wejeg.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
wejeg.exepid process 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe 2768 wejeg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exekydoo.exedescription pid process target process PID 2416 wrote to memory of 1040 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe kydoo.exe PID 2416 wrote to memory of 1040 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe kydoo.exe PID 2416 wrote to memory of 1040 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe kydoo.exe PID 2416 wrote to memory of 1040 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe kydoo.exe PID 2416 wrote to memory of 2596 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe cmd.exe PID 2416 wrote to memory of 2596 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe cmd.exe PID 2416 wrote to memory of 2596 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe cmd.exe PID 2416 wrote to memory of 2596 2416 960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe cmd.exe PID 1040 wrote to memory of 2768 1040 kydoo.exe wejeg.exe PID 1040 wrote to memory of 2768 1040 kydoo.exe wejeg.exe PID 1040 wrote to memory of 2768 1040 kydoo.exe wejeg.exe PID 1040 wrote to memory of 2768 1040 kydoo.exe wejeg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe"C:\Users\Admin\AppData\Local\Temp\960d2e904aa6496adc954a24a5d94a1063d64eb3590ceec5e3e4e7a4668c8940.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\kydoo.exe"C:\Users\Admin\AppData\Local\Temp\kydoo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\wejeg.exe"C:\Users\Admin\AppData\Local\Temp\wejeg.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b3187a86766b2ef06bd7a0728e077f62
SHA1fd760cc762b685cdd8fef0e8d6f2e25e40e38b73
SHA256ead8a0f009a8366a15e7ced6b3224b0f9281a0261612a3d8f8c0cc55ff05fd3e
SHA5124ad983a3d2bf09d15dbe9f05fc373d4e60c5485379e550fc8b62ac9a267202b2661245738129a4b2eb9185e6739dc175ebbf1227c444fb4f956ac79dbf3d4c47
-
Filesize
512B
MD557d3bdaeae3719dc04e483022acbe8b5
SHA1438e2bc4984d87fd3a1a80a50768b53ab34482e7
SHA256ae6a200df734e70655e91353965d839d4b988840ffa561c78ff433335b9f4687
SHA5126d3a8a1f4b7ed493257749a05c89d88f571e604dbc2ef4c4fcf71f060e8523cfdc2125618911a09fc0e029a19052f7e59c7c01dc52fb36ac8b55f2d7ba913a42
-
Filesize
335KB
MD5d1b68f2bdcae5254dbc94e5ae0d15e58
SHA121fd733c99400a2eab529d9dc98ea64cf052002d
SHA2560248acc21b1dcda061876ea589a7d691496b68beb3b1c6d24b0aa9058e2c930f
SHA512ab15fd7dedded1bf0849dbdb12dca5a6710700025318b166bbc0a18175b71c548d6e337093f1d42c075f1c87e8f6f743484074dc658ea0000117cc1307db475b
-
Filesize
172KB
MD515ee15487d6bfb7a82bdea24d066c130
SHA1066d8a14d4fdab5c3a6f5a9ec0c18720f9e9c79c
SHA256ceb999d51f3a6b3c44590f3a879f455f879c21ca72ba09d951542d0c3d559302
SHA512950ce3a3c194740f1065016b7b8ca17174203e7369e6ca2e5597820ff2ab532b74e2c2606a875eeced7e299f063de3b3949565d7313a786246d99de50c01ebf4