Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe
Resource
win7-20240903-en
General
-
Target
16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe
-
Size
332KB
-
MD5
c5105fd9f1ab2ad22f450fff55d33143
-
SHA1
e68a07e75bff28a4bf27567dfdef8bd519fb8a5a
-
SHA256
16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662
-
SHA512
de98bee6a670b9b7e787e50786c75feecd647b3cde1dea6d01105f32b3271c61c4fbc881e7609f4ba33d0e36156117e430ab6f532e030c4550eb2147095f1670
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66cib
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1632 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2052 koyxf.exe 2660 hyorh.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 2052 koyxf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hyorh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koyxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe 2660 hyorh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2052 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 31 PID 2644 wrote to memory of 2052 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 31 PID 2644 wrote to memory of 2052 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 31 PID 2644 wrote to memory of 2052 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 31 PID 2644 wrote to memory of 1632 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 32 PID 2644 wrote to memory of 1632 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 32 PID 2644 wrote to memory of 1632 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 32 PID 2644 wrote to memory of 1632 2644 16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe 32 PID 2052 wrote to memory of 2660 2052 koyxf.exe 35 PID 2052 wrote to memory of 2660 2052 koyxf.exe 35 PID 2052 wrote to memory of 2660 2052 koyxf.exe 35 PID 2052 wrote to memory of 2660 2052 koyxf.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe"C:\Users\Admin\AppData\Local\Temp\16261fb3a703ef33965fc35d7230b5f0ca970b9e02377f20faabf7be3f5f3662.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\koyxf.exe"C:\Users\Admin\AppData\Local\Temp\koyxf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\hyorh.exe"C:\Users\Admin\AppData\Local\Temp\hyorh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5f82b5e46ecc7199a4d77265ab29e761f
SHA1471dc7642de247841861ef0047e6e73fe6e0509c
SHA2568a106558acbed72ae6114bc0d074af4570578010fffa14854c5f703466ebd300
SHA512bec787feeb03ebb2cc4477ffa405f3f39cdb02a85c134462f4907128c7fa82532c5a83ddd39f7a26a9b9a8084fb65ed2d7ee7d63e42ec779c7c63a3a89fc13b7
-
Filesize
512B
MD5a7ea4ca1cb2d853248d2c346d53c1a89
SHA17094950c19151cf7e9c9769a3fcf94e28577612b
SHA25610617ca586e80e1a77500845c0cae1c2cf2d48c767d837bce978dab7ed9fe8d0
SHA512ffc54b8e38580cb7b112619329e70622a8096ea8f7708b8182ea6cf732b1efdf39874760bdaa6534af14d8f25fa8375ff37e8f198f080c1b5c2a0bb87643ddd7
-
Filesize
172KB
MD56e9d5067562701bd3a52e6454a580fac
SHA149f036d2837b0d8a4b5c9da34e31f1d75bb42c23
SHA2569463a11a0c81587cebd78ea9a60b4ca7e2f329a1744eaaf42be33eef02ec9d54
SHA5126f8af7caebdff2b1d525d63049b67143cfb460cea6bb591db3e22dd5c192a8db169526f39e25bbc8accef13582330e699b21c72f4c6375cb42604faf4afa9ae3
-
Filesize
332KB
MD5cb8d302f0c612b41308253e9bce779d3
SHA1890ed024492c8ef8512b6c6383d5fe7e9fc512e1
SHA256ccd3a8d2aab90d17b36172d32976f231cb4d5e4d987a6698341b1f79b8820043
SHA5127ace1ab09033454b98392dc4e7a7ebb8d3080985a73b41866b314b94363364f2fdcdb3d452b28c8100285685a5dec31e7e629cd00f907c67b2372ad858e4fe18