Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 09:25
Static task
static1
Behavioral task
behavioral1
Sample
08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe
Resource
win7-20240903-en
General
-
Target
08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe
-
Size
334KB
-
MD5
a028ad301750d80f90286320c4447dd0
-
SHA1
d21f9b6e7516b5af96caaaaf600f2cdef94fa9cf
-
SHA256
08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c
-
SHA512
0d31a15091e37fe85b65b16dbc4bc8adb6f66987913824c160ab708047d51a3f96fa946a6553705cd4b39bbd9709c2d238950719e5ee14d2e0f82a9db23efdba
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYm:vHW138/iXWlK885rKlGSekcj66cix
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 380 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2364 kakud.exe 1708 dites.exe -
Loads dropped DLL 2 IoCs
pid Process 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 2364 kakud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kakud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dites.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe 1708 dites.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2364 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 31 PID 2644 wrote to memory of 2364 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 31 PID 2644 wrote to memory of 2364 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 31 PID 2644 wrote to memory of 2364 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 31 PID 2644 wrote to memory of 380 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 32 PID 2644 wrote to memory of 380 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 32 PID 2644 wrote to memory of 380 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 32 PID 2644 wrote to memory of 380 2644 08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe 32 PID 2364 wrote to memory of 1708 2364 kakud.exe 35 PID 2364 wrote to memory of 1708 2364 kakud.exe 35 PID 2364 wrote to memory of 1708 2364 kakud.exe 35 PID 2364 wrote to memory of 1708 2364 kakud.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe"C:\Users\Admin\AppData\Local\Temp\08aead7273082b7d71818151a30eb3b88a53a7363fa014b7d250ec98e31f273c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\kakud.exe"C:\Users\Admin\AppData\Local\Temp\kakud.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\dites.exe"C:\Users\Admin\AppData\Local\Temp\dites.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5bd79dbd44d14f0b3f15d726bb37ead07
SHA18060d0306339115bde5b55889fa238dbaf1ef34f
SHA256e675fb7c52d8d4c380ec2ae263b1284d5eab2de83f24322569490fa7ee024f62
SHA5125a3d7b5703ab9318d025c0dee399fabb368731c08a9798f92b226ea6fc3a980fe863e39d31966a01e4135526a71558287d7f846a162386ec6cc1eaf83f430311
-
Filesize
512B
MD5a80357a896423614af3da0d9cfad30cc
SHA105fcbd8556f366b63a31b7d34e4dd1436d496d9f
SHA2567ba7082f2c50de6bef415c9dd9aed042efba22300c77c06ac87e305a6232b7c2
SHA512cefd9ed27c0c93bfaeeeddb1a16bd20bcb37fc98a6be2c5f3d7214124979ddbed172ed9860343c07cce354064fd406707382f758606217d24362b93f3169b9cd
-
Filesize
172KB
MD5b68a70421e781ea8755cc31a92115baa
SHA18116cd488848f980f980b8a92e803a8a1a3fdf68
SHA2565bc78966004118e1f7fc4b7ca4d4b500fe5d3835f3b252b223f3e1005173935f
SHA5124027d159d58a63177782c85f335ac5f25ebe4bdef67d0d7fc3dc09084edede64acd19a89d141ce2521c0be53dbf975171e6ad8dbe9a8b635a23d098de2a182a1
-
Filesize
334KB
MD5326cdce3f7d6531b0c8deb5f725f1d25
SHA19878bf5b4b117ba21c935d1dad3854c01499c564
SHA256a7eb28af33c9f6aa4ac6dd5c13f7c24639e1a663da3683ffa64c92e6a6f0b18f
SHA5123129a3f241cc70545cbe3ba94c82edb4528dcd328459a3b92875d6a8067043882aa6726fabf6ecbcdf234edc83452ab5cccaf09afc5836bf459b97770bfd6548