Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 20:48
Behavioral task
behavioral1
Sample
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe
Resource
win7-20240903-en
General
-
Target
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe
-
Size
660KB
-
MD5
fa22a94cf15e0f978ab5f354af7b28c0
-
SHA1
75997c17a503e2a2f48f5d81a7f561a7d90fe7c9
-
SHA256
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074f
-
SHA512
0a8f9f498babb7ac26455b8e8c0d9e286b7977c35e436de6ebbf0bdc9318f576f432ab404a59e11dd6b1629baaed0fcd46811da27706ab51d73016f8afb907cd
-
SSDEEP
6144:O1xBWeMRygxDLbHxlSBxzJn1REBB6q1gBFJV6AvRqsf6YU+FM+3Yn/fCXjQGDqLO:Ol3MQIDKJzTq+Xxvo0U+d3s/fCX0Y
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2604 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
vuvup.exeytazt.exepid process 2564 vuvup.exe 1416 ytazt.exe -
Loads dropped DLL 2 IoCs
Processes:
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exevuvup.exepid process 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 2564 vuvup.exe -
Processes:
resource yara_rule behavioral1/memory/2792-0-0x0000000000400000-0x00000000004A5000-memory.dmp upx \Users\Admin\AppData\Local\Temp\vuvup.exe upx behavioral1/memory/2564-12-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/2792-18-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/2564-21-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/1416-30-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/2564-28-0x0000000000400000-0x00000000004A5000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\ytazt.exe upx behavioral1/memory/1416-32-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-33-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-34-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-35-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-36-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-37-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-38-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-39-0x00000000011B0000-0x000000000126A000-memory.dmp upx behavioral1/memory/1416-40-0x00000000011B0000-0x000000000126A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ytazt.exe7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.execmd.exevuvup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ytazt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vuvup.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exevuvup.exeytazt.exepid process 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe 2564 vuvup.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe 1416 ytazt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exevuvup.exedescription pid process target process PID 2792 wrote to memory of 2564 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe vuvup.exe PID 2792 wrote to memory of 2564 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe vuvup.exe PID 2792 wrote to memory of 2564 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe vuvup.exe PID 2792 wrote to memory of 2564 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe vuvup.exe PID 2792 wrote to memory of 2604 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe cmd.exe PID 2792 wrote to memory of 2604 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe cmd.exe PID 2792 wrote to memory of 2604 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe cmd.exe PID 2792 wrote to memory of 2604 2792 7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe cmd.exe PID 2564 wrote to memory of 1416 2564 vuvup.exe ytazt.exe PID 2564 wrote to memory of 1416 2564 vuvup.exe ytazt.exe PID 2564 wrote to memory of 1416 2564 vuvup.exe ytazt.exe PID 2564 wrote to memory of 1416 2564 vuvup.exe ytazt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe"C:\Users\Admin\AppData\Local\Temp\7526cf640a772dd13e6252a3fb94cf1975fd347f4f67246075e8012ef67f074fN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\vuvup.exe"C:\Users\Admin\AppData\Local\Temp\vuvup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\ytazt.exe"C:\Users\Admin\AppData\Local\Temp\ytazt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343B
MD5f46847abee1e922e6e3891fed2523c49
SHA192e963e39c22d1e9025dd4e083605fe7656a9a05
SHA256a5e75557e8eb4c098e7100d141c75186dc3be071245f2eaed23b17e7b8c72d30
SHA512c4acd3e822197402611464b7a4cdece51716c1805e2f291701a0028553c472b2f30400b11b998497253ebc13ada4c9991d40e50f69f6674c8d2f30d0f207313e
-
Filesize
512B
MD5d644eab43114a98005202d3dc93f0b17
SHA13f5f7d497e5e5202991eda8edc149e6fc1baf71d
SHA256c628417a8144a441f387231815b09b0d93dfe59eb9607450fede578bee83c814
SHA512b233b60ccf24514e4809d13f0ccd44c02b6f05af16d51444ef5227e0d6356c27c0c76952e171dbbbc2677bba678c7069ba387ce5d0669dc570e97ab4db343120
-
Filesize
243KB
MD5e84b580d4addec6662b9d0c0de2de70e
SHA147dc175d20ec8f5eeb521b88e6a6c9a78bb0ebfa
SHA256effb88959af5180c695a67ce6c43ffd03dc57a0ae6590666944145db50f4713f
SHA512deb935a4d62d39d256df7ef656a2bbea13a286c1adbef6671fdea0552e6f67e3e9b4bc8cd30155b2d2d0b33a3aad102f829623896c6dfccc87e82e99fb73d57d
-
Filesize
660KB
MD5b7592fbe5a550c733adc4b04844a043c
SHA12cb2d83e162e25866ab2a6fdbc8e0ec137fa491d
SHA2569631c6fe3193d8f4948e03a425d1ba1e4bb00f20fd7a9791e281fc11ba6f874b
SHA512158e4d25d3a69705dd9b7c08ec54e824bef260913c690e9dc0718acfe67dc719babefd090a7e0d7feb12e78d90580d1a68d08904a9e408a1e4bacb814468a7b8