Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe
Resource
win7-20241010-en
General
-
Target
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe
-
Size
332KB
-
MD5
0c532605bd6041f0da53a6a9ade4ccc1
-
SHA1
b94d3dd6f45d0553004adc2672ce539f4ea8d613
-
SHA256
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b
-
SHA512
2019433e7f79bac22372cf967745ee5113a19507a523f48cc896e6ca4a769702f448770e11bef8656a9485038bf41eb72c25b203d1897ebc6a128fa0c72f6d87
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY+:vHW138/iXWlK885rKlGSekcj66ciL
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2868 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
nilaq.exegiazf.exepid process 2936 nilaq.exe 1900 giazf.exe -
Loads dropped DLL 2 IoCs
Processes:
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exenilaq.exepid process 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe 2936 nilaq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exenilaq.execmd.exegiazf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nilaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language giazf.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
giazf.exepid process 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe 1900 giazf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exenilaq.exedescription pid process target process PID 2772 wrote to memory of 2936 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe nilaq.exe PID 2772 wrote to memory of 2936 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe nilaq.exe PID 2772 wrote to memory of 2936 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe nilaq.exe PID 2772 wrote to memory of 2936 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe nilaq.exe PID 2772 wrote to memory of 2868 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe cmd.exe PID 2772 wrote to memory of 2868 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe cmd.exe PID 2772 wrote to memory of 2868 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe cmd.exe PID 2772 wrote to memory of 2868 2772 3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe cmd.exe PID 2936 wrote to memory of 1900 2936 nilaq.exe giazf.exe PID 2936 wrote to memory of 1900 2936 nilaq.exe giazf.exe PID 2936 wrote to memory of 1900 2936 nilaq.exe giazf.exe PID 2936 wrote to memory of 1900 2936 nilaq.exe giazf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe"C:\Users\Admin\AppData\Local\Temp\3992c40a3facb1621e3289a8f27de223643c750846bc3df81b9bed3c8312116b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\nilaq.exe"C:\Users\Admin\AppData\Local\Temp\nilaq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\giazf.exe"C:\Users\Admin\AppData\Local\Temp\giazf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD58ce8b29932ebadf525fb715e36148a52
SHA16ebcdfc2916987af7c6adabbbe3731614a745f6a
SHA2564daef5587fdbc87677e9b08a1bc616a354407aa3137606ef19dfd5ca52a28093
SHA51211dd37baa32ae031ebafb3fa5b694f330b6c614cdfd85b0521bc967a8f37296c761858b33e37b86d5c6c38c7cd9a10c65d6e67fa62bb308e71be352ec7c9b80a
-
Filesize
512B
MD5e7e42ac66e0b868a1e241bd7ff1b2acb
SHA197835b4498c9514fa7e24f8af02801b4e8298012
SHA2568cc70c94007963076c722b387503120ab0d8757454e8f916d18087dd39b6ac52
SHA5123e8846e57bb609f26099107f3143db1bc4f638ecb34fe4a7402b17e26dd69b6bdd87680f2a97496260c5f5ab02a7a475cf585ea853d6889825994903ab2a9476
-
Filesize
172KB
MD5097076272d3bd2175fb81aac5e47fc8c
SHA1156554f3ca28cb1c0bd02080a13df472b34931a4
SHA25677011a968f5c7ee5c47f07e31499cba7e3a452c04dd63705ca07bdd01e18b4c6
SHA5122a4e7d94e322854752faa05ebe783d8a739c066227384d086e28f1cb67eb0e2d62c629d86c9107ceaa16d97922207d97c10f3a996064366f545648d3b593370d
-
Filesize
332KB
MD53e8ac6111eabb9c0cbb732ce4c3d32de
SHA1c6047eac1efed8253b5322faf501170b65b834a6
SHA2566c05262ee443ecf3f82027e1d016581c70d1cdf78921ac593cace8cbb753c054
SHA51240663edbcf8c9e692f9baae518f9e252c7868e66d2448a61028f863e17a89eb8f56e7f2182aa8b80408379a921e593d3707929feb6baccd33cb7ddc18e2b1bc8