Analysis
-
max time kernel
68s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 02:35
Behavioral task
behavioral1
Sample
7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe
Resource
win7-20241010-en
General
-
Target
7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe
-
Size
463KB
-
MD5
e0ada6ad8b630e3a025fa62c846a1346
-
SHA1
84132766b6ecfd33760c40ff23f9abe286902944
-
SHA256
7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614
-
SHA512
b4afe28fcae4fdc29be8aef9c3c73d35e78559cc4117922850c6eea71b506b87ce8b2b518c24497c8d5654227217f21741e04f74022cdcb00062d2765a25425c
-
SSDEEP
6144:P8Eoe/IebBVMweZGhHdJBV70FVKLbfW2x8VyMsmD6gzOmjpi+pMJQ8uUm9unpms:vDdUGhHdJ370FVKmP0Ml+gzzjp+lsu/
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
121.88.5.181
112.223.217.101
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2828 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 sander.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sander.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2908 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 30 PID 2768 wrote to memory of 2908 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 30 PID 2768 wrote to memory of 2908 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 30 PID 2768 wrote to memory of 2908 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 30 PID 2768 wrote to memory of 2828 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 31 PID 2768 wrote to memory of 2828 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 31 PID 2768 wrote to memory of 2828 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 31 PID 2768 wrote to memory of 2828 2768 7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe"C:\Users\Admin\AppData\Local\Temp\7d8b01e27861c2cca4d683a3934509c01e5390dddb1c49e01379029c84b41614.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"C:\Users\Admin\AppData\Local\Temp\ctfmom.exe"3⤵PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD54f2d8dd0ff0913366cfe1cc6f9758921
SHA1c8fa363f87cc0fb225c3a954c9f72860424b809a
SHA25667de4145656a5bdd3e986e1256391fd360fc93df3bcc584984c990af11c1eb0b
SHA51232228b6b20f1d6b7834d19f3a6442896edc2c9a63faeed19f28febf6bda7b7062218678aa8c967a5262b0d640d1181af47f777fcc38f42fe229a2b20b9c6c84d
-
Filesize
221KB
MD53ebe4bafb8c01e4a2418e631a0129690
SHA1a7a91d3fc5d8ed8f4e77b4dee4ef1d6ed2c9913a
SHA25677982f0d95b3c59ff67b19267d01e970f6e80c247da89e404de7e98ce3d370d1
SHA51215d9c9a35110b3b1f9007158181c547a5597801c8ab9b722b7d81b61aa35c83d2160a2f4112d1cce0787630d4f4722d7ca404b9fbf2d349d1871d0f41456d633
-
Filesize
512B
MD504113afab96ff36e7da4cabf336079cf
SHA12ab6a01f123c1ef4227cb134612749b67a237bf6
SHA2568b3cc0c31002ffa60f497966a671ff1c0a23a6efa831bd2be2cfbee7588bac16
SHA51268358e6ae577e59dd540c31d4cfcf56968d9b84416ffcd527867711165d78a9f351da0bf41afab96107b1dc736467b092f5b79be2b8f7f96f6871e4a0b5472e9
-
Filesize
463KB
MD56fe1693bc61aa4af8be22d357171a293
SHA18b1563d8342da73a88afc2b90a0639b70057cb97
SHA256c235d61984412b86bf9ac4abe02984832b850d655ba9ef0d7d71dbd40a5532fc
SHA5129f3f48ef078e84f38058c9ec9420485ab38215b1b3fc5a3fe6691e99c316060f36f0e085fb83d3d8ce33c08e839d4ff9a6dd3f29d5e78dfb516a27f510cc56fb