Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe
Resource
win7-20240903-en
General
-
Target
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe
-
Size
334KB
-
MD5
a52fd571b858e759fa3d71055f6eb4da
-
SHA1
244a27d85ea646e78cf4172f48c5dfb4ce19f676
-
SHA256
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04
-
SHA512
873b6207d64514e918c78b58d8aa287cc04253ac7304d7684f7d5a6972fd8ecce4ed14c8d07c09660b50e3599564ee7280116ba5dd3ee9d14b686c56f2e69fb6
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9:vHW138/iXWlK885rKlGSekcj66ciw
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2636 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
reqyz.exegacis.exepid process 2912 reqyz.exe 1688 gacis.exe -
Loads dropped DLL 2 IoCs
Processes:
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exereqyz.exepid process 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe 2912 reqyz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exereqyz.execmd.exegacis.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reqyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gacis.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
gacis.exepid process 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe 1688 gacis.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exereqyz.exedescription pid process target process PID 2136 wrote to memory of 2912 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe reqyz.exe PID 2136 wrote to memory of 2912 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe reqyz.exe PID 2136 wrote to memory of 2912 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe reqyz.exe PID 2136 wrote to memory of 2912 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe reqyz.exe PID 2136 wrote to memory of 2636 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe cmd.exe PID 2136 wrote to memory of 2636 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe cmd.exe PID 2136 wrote to memory of 2636 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe cmd.exe PID 2136 wrote to memory of 2636 2136 2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe cmd.exe PID 2912 wrote to memory of 1688 2912 reqyz.exe gacis.exe PID 2912 wrote to memory of 1688 2912 reqyz.exe gacis.exe PID 2912 wrote to memory of 1688 2912 reqyz.exe gacis.exe PID 2912 wrote to memory of 1688 2912 reqyz.exe gacis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe"C:\Users\Admin\AppData\Local\Temp\2ebc74c9c9ff4424780e08b61dd4d19408dfb850d1046f2fa1b9a157fc4b0b04.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\reqyz.exe"C:\Users\Admin\AppData\Local\Temp\reqyz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\gacis.exe"C:\Users\Admin\AppData\Local\Temp\gacis.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD520c83f80a5acec8c249db950cfc1da70
SHA17011eccce8a8f5f75bb918352da262a7ceedecf3
SHA2567c238aeb10ae6f42e26b1d93b45a248da7d82b4a7f2a921497d88a224ed00d7c
SHA512d465772a1a83ed1dce57a079966dee04e7c249d77bb53c0b9bf8b663920e8c4167da90d29f4b5d1009193f9efcda9c62f8909d90010df2d159912d19378e4de9
-
Filesize
512B
MD5e859505595a3c5282ad499904f202637
SHA110432464bf6f4dc62a1ad8e7e6334812a715f704
SHA256316d3c1822bf5e5820aff3a254281395ac8febf169c36c23975777bb48d5f0dd
SHA512554c71a8f0dc6a8a7988fbdeaf8bfd7f5cd58d870160e4a5c967b600bbb8cf57e3304a0705870924bfa264e2f9f6d15ad6920aa7e7aa931b145bcdaa8c08f08d
-
Filesize
172KB
MD5986ba94743abd6e2f488d5affe9e89b8
SHA14e85b100f76ce4545dbd16f3b93bfd606ecc2bad
SHA256cf02140984c475df79e846410ae7f51f169853ec48a23374731c89cbb061707f
SHA5121e5127712ae4adf5aa854286bac7245dff680dd529f2c2711ee24ff370e6d9c0dff52e503b8c2687dd39c3c6baac5eacdb5d2e7fd24a45f740a3b487659760a9
-
Filesize
334KB
MD5709fe3fccbd9077f7743af511a5da0de
SHA1fca6885967441b1dff3959f66f2df46840171068
SHA2563e5c754a5993795671edd15fce48ac3b9d831e5cb4f013752499701c0341877d
SHA51247ccebeb708c3b2c5b531ad5c53b607315917e8299ee6c68754721eb0982b1fc19bebc0bf8b43d0bff8ee9eac09fbc51fefaf022393b88a2450bd54cef31c2cb