Analysis
-
max time kernel
119s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 17:48
Behavioral task
behavioral1
Sample
3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe
Resource
win7-20241010-en
General
-
Target
3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe
-
Size
427KB
-
MD5
e648b0635d12efb3ec00cab6d95b8e40
-
SHA1
828a988cc7fe85f2d99a8e4d3eee765ecc50d5c4
-
SHA256
3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48e
-
SHA512
b61eb200dbc3b4fa2a133f31575d91a182fc37b5906306a1f1678bd2f8101581604a7c36e5c2a278180b6350e7d0ed3367a9efabf502a3c1b8a6fb18674844f5
-
SSDEEP
6144:EKbwhNxUjDVMytD2NkWuRk/oBmodd+sAaTmQo2fkKG:vANxU3VH1t19MsAlpXZ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\kyabs.exe aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2836 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
xojas.exekyabs.exepid process 1284 xojas.exe 2840 kyabs.exe -
Loads dropped DLL 3 IoCs
Processes:
3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exexojas.exepid process 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe 1284 xojas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exexojas.execmd.exekyabs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xojas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kyabs.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
kyabs.exepid process 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe 2840 kyabs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exexojas.exedescription pid process target process PID 1832 wrote to memory of 1284 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe xojas.exe PID 1832 wrote to memory of 1284 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe xojas.exe PID 1832 wrote to memory of 1284 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe xojas.exe PID 1832 wrote to memory of 1284 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe xojas.exe PID 1832 wrote to memory of 2836 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe cmd.exe PID 1832 wrote to memory of 2836 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe cmd.exe PID 1832 wrote to memory of 2836 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe cmd.exe PID 1832 wrote to memory of 2836 1832 3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe cmd.exe PID 1284 wrote to memory of 2840 1284 xojas.exe kyabs.exe PID 1284 wrote to memory of 2840 1284 xojas.exe kyabs.exe PID 1284 wrote to memory of 2840 1284 xojas.exe kyabs.exe PID 1284 wrote to memory of 2840 1284 xojas.exe kyabs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe"C:\Users\Admin\AppData\Local\Temp\3c1148435fea0e979e87c9d93c29f9ee685a8cfca063bc25e78e929ee332e48eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\xojas.exe"C:\Users\Admin\AppData\Local\Temp\xojas.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\kyabs.exe"C:\Users\Admin\AppData\Local\Temp\kyabs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5880dbeb79cd26cd0cff5c79b950bc855
SHA19f3e1ea7bae694c9d1efb10c92996357ad094bc5
SHA2564a3a8a623aca8fafb6d49d51e48da54155c0c58fea7967413f9134ed2db28000
SHA51205cde8764a19e3e8d9ca4e657f5e7e30272a5d4e58d44d34a0e209a4023c83a64b2980156bc5d30510438b2d7b107b939a286e4f8fc0c73a8798bebda17f739d
-
Filesize
512B
MD506bb4d3de96d362c1871f696756962c8
SHA17b2107f541f463d9f6d243000324369a7079c719
SHA256257d63aaeb91f07294d7b64ce97719cbd1c922e803aee7cd8106ed3f32e276fe
SHA512b0ac71a249605fa0ca99caabacc0f4b047e1256175e1caa3012aad983261d6c31ab218145b95d28016d8cd8a8ad86e27a2ae848a3bbab3dd322ed7415d56417c
-
Filesize
427KB
MD52c5f60d8da4b48e3a8ffc55f25945565
SHA1d30bff3ff8e56eb938142616877c0b4ab94151cf
SHA256ee1c36d29df7260cb8d29c381bbda0e7d1b6c19a59eb39c558c229f67d751e33
SHA512eea2f90f457b60232796988417a1c923f65f86934e7cfb291ddbcbca08b1748035a27042ef694e99222f0a79f24083d18464a65b260fa22791bbab66402a7762
-
Filesize
216KB
MD5a983f7b5dab085f17a00ed5da009dd13
SHA14201a8af501e005bee4a352e96ec8948c9733a1b
SHA2560cce80b710a464a4ed736bffbc81d589508d4c9855be0023d701d832e18e7466
SHA5125acda00e2e1e014fcbab02836767b61d8f94d374f3d63fb85e1294c73326e451449d9d7ee48234a01bd76e566c996d1eceefba6c39e6d5d4b2a00e4a4e134558