Analysis
-
max time kernel
2s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 07:40
Behavioral task
behavioral1
Sample
a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe
Resource
win7-20240729-en
General
-
Target
a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe
-
Size
467KB
-
MD5
0f5e4bbfcfd0acca9f07f391dcf1e589
-
SHA1
ac4160ff4b83c36db425c6b68845c34ed6935557
-
SHA256
a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62
-
SHA512
a7aa485826d8fa53ad0511962e6c89e490fd43492317e7d987f18239b22b14c5b648e860342fe98095f7e5c45d98255cb0371d969f1e139d5cf57fc8692a3c8c
-
SSDEEP
12288:m6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1Uv2:m6tQCG0UUPzEkTn4AC1+1
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Urelas family
-
Processes:
resource yara_rule behavioral2/memory/3160-26-0x0000000000400000-0x000000000049F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\irmia.exe upx behavioral2/memory/3160-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3160-29-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3160-31-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe"C:\Users\Admin\AppData\Local\Temp\a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\goyqd.exe"C:\Users\Admin\AppData\Local\Temp\goyqd.exe"2⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\irmia.exe"C:\Users\Admin\AppData\Local\Temp\irmia.exe"3⤵PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56c4708585b360860ef816d0d6d3b3655
SHA1a1f0a223f31a9fbc8e4fbe1baadc1861081ace1a
SHA256faafab5754a0cc58182156aef5d7dd79731fa10f990a12c534bc5849887a7cff
SHA5122c2db0f7dd2e805c99a0fb0f627dc0230d2ce508c9dfb16a203392439b87993380f8c3a107f8ccdd78ceb5266c811375970db90c11e2e366deb2b5ad7447793c
-
Filesize
512B
MD5e481570ddc9f337fd7f2eeb85a119658
SHA1b72234a85823c228f5668d1aefd59fae7e475dac
SHA256ab2af664b5ac795e8420a400646f7fe3725166ff09d75e88ae48f7f0ca28eb08
SHA512d8d6d860a2e5568b237f95b611f5f9e0622248386ae601f4938615cdc16481a423abd2bdebd420e7af2054ee7af40fb290410f70c988975499d7f39457b39178
-
Filesize
467KB
MD5ca63839bb0c954e68ddbdfb1423e74dd
SHA19bc16ccd7e367692ceae399ee03ea1e5eaed885a
SHA256af337e0cd63cd513ebaec1f9a132581d90ba040a32d52c358a88eba7a91743ec
SHA51205731355d58b9400f678973a4158c10c3934d332fcc0af39fda847c0f45607ef8ab337c90323358af1ed03516c4cf38b0200c973addc887a5e87ccac1323f406
-
Filesize
198KB
MD5a6a728176f21cc133ca2bb4ea80bf141
SHA1705cd19abe0bcebd9f33ad1eda060a8481023b81
SHA256de4cad7bafac2c20e091df967a6c84090bcace05abe24d970d1aa18754c196cb
SHA51238dc9009e04e8bf8770866f91cac593adc8c3b5543b4e322b2e11283114a41c801f038bc7c724af63f0854e63d7a85aafa98dba30a6e67a73be5297de1948e23