Analysis
-
max time kernel
90s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 19:20
Behavioral task
behavioral1
Sample
119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe
Resource
win10v2004-20241007-en
General
-
Target
119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe
-
Size
155KB
-
MD5
af6e4b86ea8efb711d5d298600d21550
-
SHA1
a7e111767b2f7acdd1cc4c4239f3ef5b9dc74e1e
-
SHA256
119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594
-
SHA512
59aaee6129df1a809a06b0de6cbb54a050cc8a8fb42c8925e53a837616b61190ec28e9dc373db2fd67f67fa964bc967538b3d5fa39c56389257e29c035c666c7
-
SSDEEP
3072:Ntbqvi9nMKxQbZ5x66EfACsxfcYvQd2Oe:Nt2vsx+AV4LfLO
Malware Config
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2988 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1288 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1288 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 30 PID 2528 wrote to memory of 1288 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 30 PID 2528 wrote to memory of 1288 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 30 PID 2528 wrote to memory of 1288 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 30 PID 2528 wrote to memory of 2988 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 31 PID 2528 wrote to memory of 2988 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 31 PID 2528 wrote to memory of 2988 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 31 PID 2528 wrote to memory of 2988 2528 119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe"C:\Users\Admin\AppData\Local\Temp\119ce6d9f4af2738ead78efc190413291fdabe445d7d54d1dbdfec498dab0594N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1288
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD52930c042c9ee5e07f321f2134a0c7edc
SHA1ee39f41eaf6ce3c8d917a89e65959414ae0088e6
SHA256a328475bbb730da292b83ed6cabbdbfc0616f042296f0c6fa356c5368ffc1309
SHA5122da91d5effc116d8c8661c2a99f1d9c2aaffda0f776551dc7ad1911fdb2765591e5b441b9a1fe0090bcda8ed24d180b563ed2c127676cf1de40001e4b15b5506
-
Filesize
340B
MD5adf7c8df135434efdced5c3f888eabab
SHA15aa2ae3eab9903adc7c76b45250629d943d68972
SHA2565e6c7ee8b41c005da91f8fcabcc3d732e2f901d1a3aa45e4860e0eca7bc6ef37
SHA512021d2dff58febc157fbfdcd9e2ec86ce0c37d87a508020a1fe671938ac33858d0231428a1e99066d12a4ffa4b3bc4b7cd60ede9488cdbc974a1459920607d621
-
Filesize
155KB
MD5e0dc07f2f346f1a3dbc2256c9e1ebfd4
SHA19932aef8ba601f7a9d4ec472ba22c2d3e8ca5e86
SHA2567138419138ffb213fd9d7e12c979152441c80bb7cb58c71aa458400cb2b4cb67
SHA512d0f127ad82bbcab5d14558a63741cb298d35d37d7c2076b836ae608bf5589b211045afc1ea5a540a236cc41c039e6efb43de801ae1f17262951146c26ff297e9