Analysis
-
max time kernel
119s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 17:41
Behavioral task
behavioral1
Sample
fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe
Resource
win7-20240903-en
General
-
Target
fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe
-
Size
332KB
-
MD5
d7bec197c8269cec9ea1905b570e5460
-
SHA1
8f10fc96f5e1c8bbed1fa5a609acf0377dca5c33
-
SHA256
fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1
-
SHA512
6fb568547dd2f76dc1c21ad14fcb3a95ef6d34f226a5450eeca3d3782b0dd416ed1794323a104e1c110dc6dfe8ffa3f63bbe10e92180e052e24119577574978a
-
SSDEEP
3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZisq:Nd7rpL43btmQ58Z27zw39gY2FeZhmzX
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\luaqv.exe aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2168 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
sowyn.exeoqsiva.exeluaqv.exepid process 1052 sowyn.exe 2748 oqsiva.exe 704 luaqv.exe -
Loads dropped DLL 5 IoCs
Processes:
fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exesowyn.exeoqsiva.exepid process 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe 1052 sowyn.exe 1052 sowyn.exe 2748 oqsiva.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
luaqv.execmd.exefc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exesowyn.execmd.exeoqsiva.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luaqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sowyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oqsiva.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
luaqv.exepid process 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe 704 luaqv.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exesowyn.exeoqsiva.exedescription pid process target process PID 548 wrote to memory of 1052 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe sowyn.exe PID 548 wrote to memory of 1052 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe sowyn.exe PID 548 wrote to memory of 1052 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe sowyn.exe PID 548 wrote to memory of 1052 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe sowyn.exe PID 548 wrote to memory of 2168 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe cmd.exe PID 548 wrote to memory of 2168 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe cmd.exe PID 548 wrote to memory of 2168 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe cmd.exe PID 548 wrote to memory of 2168 548 fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe cmd.exe PID 1052 wrote to memory of 2748 1052 sowyn.exe oqsiva.exe PID 1052 wrote to memory of 2748 1052 sowyn.exe oqsiva.exe PID 1052 wrote to memory of 2748 1052 sowyn.exe oqsiva.exe PID 1052 wrote to memory of 2748 1052 sowyn.exe oqsiva.exe PID 2748 wrote to memory of 704 2748 oqsiva.exe luaqv.exe PID 2748 wrote to memory of 704 2748 oqsiva.exe luaqv.exe PID 2748 wrote to memory of 704 2748 oqsiva.exe luaqv.exe PID 2748 wrote to memory of 704 2748 oqsiva.exe luaqv.exe PID 2748 wrote to memory of 1268 2748 oqsiva.exe cmd.exe PID 2748 wrote to memory of 1268 2748 oqsiva.exe cmd.exe PID 2748 wrote to memory of 1268 2748 oqsiva.exe cmd.exe PID 2748 wrote to memory of 1268 2748 oqsiva.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe"C:\Users\Admin\AppData\Local\Temp\fc2a8dce0c6f439b115915224de2c6fcb3ecf44e853095ab70142c6e06b052b1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\sowyn.exe"C:\Users\Admin\AppData\Local\Temp\sowyn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\oqsiva.exe"C:\Users\Admin\AppData\Local\Temp\oqsiva.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\luaqv.exe"C:\Users\Admin\AppData\Local\Temp\luaqv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5bf638f960b44c23b7778c8805b7a7a28
SHA137bcfac6b30443d839750d33d6238bc791ac0b78
SHA256571a8614bcd9778788d6a2f631f950531b2686141f9a4862025078265acd7067
SHA512dc8f56656529ad22e3672bca101ca40606db941ebfc46e7f195ef6394c929ca1cbf1b02a46cb1124273c099095a3f913a40777931da2475804b7f42480d4340c
-
Filesize
224B
MD5dbc28b8ead427eecff90ad5c2b286725
SHA1842de407e4769f541d6b8ff676bbe88a77ad3f77
SHA256eab23681e4205ebc6c6cfcdc4501c660759ac4855b4abbb18ef1e4c26d518735
SHA512f46d22bb4ede0f39d0d6d05cc820c6c9b6f29ed6a4608c55f06e44f4a30f05fc3a792b3db64c0c53cab3f12f0e40e71604f8dea94d683a669629cc6aa8d0d112
-
Filesize
512B
MD5f1e92b78a2d738db2ee753671371f36d
SHA1e09f703c5acdb41b60aaa4372e6d5666d8f71564
SHA256b74276955e89cb19e26c44a2fc629e77784b5cac5a98e84e8ea5bb8155eac154
SHA512efb6dac717cf65b034b3db692a521e626539eabbfcf9ba2c7e5af7db50576f00b12a7ecdb2bee2c6ad7e8ce3b6920a9ac54aab181cb64409460e301a72498139
-
Filesize
136KB
MD5a468729630d4281ab15862c7e649192c
SHA1ea23d1d0dc787001917a3e3b2763b572d40f296f
SHA2565bc13be5aa5b42c5ac9963040d2e5386c5813eeb899d4b82a3c3afbdd5f64c96
SHA5125dfca96ebae4b9771dccb7f90bcc757331f901942399032d0882c2a23da6185da789d334d8f9f89deec61f05ca0b7061fd281ba31a6d2ec84e74c293672ec08d
-
Filesize
332KB
MD54c78d4e96cc1b7e65e4e6d84abfe1bfd
SHA1546995c1ecd6d96236d4f9d3e0f28f5af430b866
SHA256b8e85cb3ac064fcbb785535afba4ea587c64c3af49d723c835f5768c3455bade
SHA512c14825a1cc4c06ebd85608e7260fe9a91fe5dc789066ba6cfcdf56c0cb09e73132f70987cac3685919ee2e3d64ae4077f82262215c6b14a8f1e7d8993ffcdae9