Analysis
-
max time kernel
119s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe
Resource
win7-20240903-en
General
-
Target
be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe
-
Size
333KB
-
MD5
23c77673328452fe83e7f4c9ffe44b48
-
SHA1
450b06237336098386446a853cd2d97477318acc
-
SHA256
be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb
-
SHA512
006f02d5ab0415f58223d9d4de20f11ad871df47ba5a552b5b9d8ce888f46bc0dcb39bb14a867f82cbb69f7e79819b27ea3f59fa3bf324284ec2a09c6ef8d8f9
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVp:vHW138/iXWlK885rKlGSekcj66ciEp
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1680 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
biypb.exerarot.exepid process 2044 biypb.exe 384 rarot.exe -
Loads dropped DLL 2 IoCs
Processes:
be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exebiypb.exepid process 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe 2044 biypb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exebiypb.execmd.exerarot.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biypb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rarot.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
rarot.exepid process 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe 384 rarot.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exebiypb.exedescription pid process target process PID 2556 wrote to memory of 2044 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe biypb.exe PID 2556 wrote to memory of 2044 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe biypb.exe PID 2556 wrote to memory of 2044 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe biypb.exe PID 2556 wrote to memory of 2044 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe biypb.exe PID 2556 wrote to memory of 1680 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe cmd.exe PID 2556 wrote to memory of 1680 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe cmd.exe PID 2556 wrote to memory of 1680 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe cmd.exe PID 2556 wrote to memory of 1680 2556 be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe cmd.exe PID 2044 wrote to memory of 384 2044 biypb.exe rarot.exe PID 2044 wrote to memory of 384 2044 biypb.exe rarot.exe PID 2044 wrote to memory of 384 2044 biypb.exe rarot.exe PID 2044 wrote to memory of 384 2044 biypb.exe rarot.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe"C:\Users\Admin\AppData\Local\Temp\be4e7d36a957f6effb39ee6e4c8fd1723de7cb3718685ad57755825466e204bb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\biypb.exe"C:\Users\Admin\AppData\Local\Temp\biypb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\rarot.exe"C:\Users\Admin\AppData\Local\Temp\rarot.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD563132647d862949de071464259a80592
SHA1194a536fe3d16b8c5c7c6b07880e63a334e15e1d
SHA2567421a8902a7ae484621e09766d63f157bcaaf48effee9a67812b547a38e006e9
SHA51270d711de6db7b36c11e1b1cb35ba95e18e1df799b431da1e03d244b3b0a6045e10c565daa965c87ca393222c68eb7bee74281f3ae12d5f3f7016d8fae81d76a2
-
Filesize
512B
MD501e0288fa51aba4ea11797042516e6d3
SHA1af4f694d45cc5e3d9a9700f37e8ea934c6513d4c
SHA256b11824b26f98474c2a00ea49050ab823b2e033111f434cc4b7aabbaed3326752
SHA5123ee8b031563ebdbff9da0bbeab942da09f02d7a2576dbcde779b06b98df702332906e53883f1a80319a3f01115b9af918c91452928dea9eb22b7038c4d479fd7
-
Filesize
333KB
MD5594fc06857d7d0a4322c77d7e99431cb
SHA106edcb7f586adff072d98ed2b7ff363632aa4561
SHA256bef6654a020cbce76be67bfc5de5b22f1f898e6746244139a270f971fd1ec4d5
SHA5124c0a55cc7b07a6c3bd7c65bc01d18e28385e9b38cb47a7a2a387a152fb0eaaa5a0066bfae60ee3e59375113a68c2d1dbc5518bfc41e207c1e696534900f66e05
-
Filesize
172KB
MD5434c8019aa504452bbcb2e5d3c714208
SHA1bced0ad06ed6dfc9ba7e87a56dcc06835623af63
SHA2561ff7b11b4a27068f323c0dd87a0ce247940567e42a1bcf964d3dd6fbf4a88efc
SHA512668aac8c3878a98df7920b56af4f53e8050f0d98ba7b2c9688113b2220c38b75b0bf5082f0069151e473ef3306942e63cafc29a34a89954ee656b7312cc7b0b1