Analysis
-
max time kernel
119s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 03:56
Behavioral task
behavioral1
Sample
f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe
Resource
win7-20241023-en
General
-
Target
f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe
-
Size
332KB
-
MD5
5c4df1da18e57a71efdf938e40d62efd
-
SHA1
cf6f8ada5a361b75ab2a82ec0856363f26e4fbda
-
SHA256
f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273
-
SHA512
866633d215a632f5b91511077c9efb3085fe818168d7d0fdb472b9bcb229392e9dcbca302b0dbdd16e20d27619514dea28e63e551d680a0d6fec142ed6632d41
-
SSDEEP
3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZisq:Nd7rpL43btmQ58Z27zw39gY2FeZhmz3
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\revyw.exe aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1992 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
jejyi.exewoifgy.exerevyw.exepid process 2060 jejyi.exe 2364 woifgy.exe 1344 revyw.exe -
Loads dropped DLL 5 IoCs
Processes:
f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exejejyi.exewoifgy.exepid process 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe 2060 jejyi.exe 2060 jejyi.exe 2364 woifgy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
woifgy.execmd.exerevyw.exef2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exejejyi.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woifgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language revyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jejyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
revyw.exepid process 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe 1344 revyw.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exejejyi.exewoifgy.exedescription pid process target process PID 2580 wrote to memory of 2060 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe jejyi.exe PID 2580 wrote to memory of 2060 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe jejyi.exe PID 2580 wrote to memory of 2060 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe jejyi.exe PID 2580 wrote to memory of 2060 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe jejyi.exe PID 2580 wrote to memory of 1992 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe cmd.exe PID 2580 wrote to memory of 1992 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe cmd.exe PID 2580 wrote to memory of 1992 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe cmd.exe PID 2580 wrote to memory of 1992 2580 f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe cmd.exe PID 2060 wrote to memory of 2364 2060 jejyi.exe woifgy.exe PID 2060 wrote to memory of 2364 2060 jejyi.exe woifgy.exe PID 2060 wrote to memory of 2364 2060 jejyi.exe woifgy.exe PID 2060 wrote to memory of 2364 2060 jejyi.exe woifgy.exe PID 2364 wrote to memory of 1344 2364 woifgy.exe revyw.exe PID 2364 wrote to memory of 1344 2364 woifgy.exe revyw.exe PID 2364 wrote to memory of 1344 2364 woifgy.exe revyw.exe PID 2364 wrote to memory of 1344 2364 woifgy.exe revyw.exe PID 2364 wrote to memory of 1424 2364 woifgy.exe cmd.exe PID 2364 wrote to memory of 1424 2364 woifgy.exe cmd.exe PID 2364 wrote to memory of 1424 2364 woifgy.exe cmd.exe PID 2364 wrote to memory of 1424 2364 woifgy.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe"C:\Users\Admin\AppData\Local\Temp\f2b985ac56833c571839097b3c82afe2e11b43eb2dadda04844e6d63d1377273.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\jejyi.exe"C:\Users\Admin\AppData\Local\Temp\jejyi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\woifgy.exe"C:\Users\Admin\AppData\Local\Temp\woifgy.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\revyw.exe"C:\Users\Admin\AppData\Local\Temp\revyw.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD547dc7a732156b403ca0a12d9d5bee20f
SHA13e0ae0b28a40825edf05e7fab0b82e30186efeb1
SHA25632de4e314c03eea206a03270e0880fa0d093978b808ef2118c75f891f9803890
SHA5125585243b21f28f8373435f0d438585f8145fc9e8e83ba361f51e488a2b7999c8208125b9a984072d363b94467db29d0594ce50b5e035e5e388244b2b80b68693
-
Filesize
224B
MD59711d59aaa882382e6ab219b6127826c
SHA1176320806b155cb83cfba25656fa881cf2223a1d
SHA256693996b7924fcf5990fad0648d2a2002cc91069cd6425fea6764374df1981c09
SHA512a8b4a5b186accc1de0f443d8e713e5f4908078f6346c0a5bb418de4497fd71e4dbb0a436c630ca1d7669ab61db863c826294aeaeece43367716bc692ca0b88f4
-
Filesize
512B
MD5483113a796a1f65170a908cc60afdde5
SHA186f72a30cdb7e3bb05f6f1210627849cacfa1177
SHA256be097ec1ecf335fd6538f633bddd6138ce676443d40cc9b772cc2667f48758f2
SHA512de572303c4010a9ce25f4657b63d082810b4bd66a2a13dae21373632ab07c18636c732ff55480363b97dc0bca7ecb1cc8e563f9f953a7f9f9d74239420c1dcc5
-
Filesize
332KB
MD5c0ae4e0ebe42883afd4f9fb32df80acd
SHA1e8f86eb435e6358e625270fc10f1b67cfc6e6475
SHA25655c6cdae432e4a28980fe518745d7dd874c70c1aaa083b6f24c8d70e86ad7484
SHA5121a9238a18d2d4dd7279da91b8d55b58ad3095c9f6f51b8962b8d8bd811a115c07d75303a8f9e7161ce035c1bea47673d42fb4df763b30bed9341f097cab3f5f7
-
Filesize
136KB
MD5c3feb6429a1d4ae693f50094cfd8c1cb
SHA11ad3ae4d3fdb8329d227300f82f168b60660a6eb
SHA25687d033bfc4c33be2f461d6f4e8842b652d245335541e57dac56bc9e4718b824f
SHA512f577fe3e39479f8d9942cd136db2b77914d63d556e78e6f09171463135c69cc4c9acfb789453ec5f7e78712dcb03ff94897dbfb532da3ccef6b7eaeca385749b