Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:53
Behavioral task
behavioral1
Sample
a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe
Resource
win7-20240903-en
General
-
Target
a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe
-
Size
467KB
-
MD5
0f5e4bbfcfd0acca9f07f391dcf1e589
-
SHA1
ac4160ff4b83c36db425c6b68845c34ed6935557
-
SHA256
a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62
-
SHA512
a7aa485826d8fa53ad0511962e6c89e490fd43492317e7d987f18239b22b14c5b648e860342fe98095f7e5c45d98255cb0371d969f1e139d5cf57fc8692a3c8c
-
SSDEEP
12288:m6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1Uv2:m6tQCG0UUPzEkTn4AC1+1
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2788 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 340 ojfig.exe 1248 dykua.exe -
Loads dropped DLL 2 IoCs
pid Process 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 340 ojfig.exe -
resource yara_rule behavioral1/memory/1248-29-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/files/0x0004000000004ed7-28.dat upx behavioral1/memory/1248-31-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1248-32-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1248-33-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1248-34-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1248-35-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1248-36-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dykua.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe 1248 dykua.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 340 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 30 PID 1740 wrote to memory of 340 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 30 PID 1740 wrote to memory of 340 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 30 PID 1740 wrote to memory of 340 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 30 PID 1740 wrote to memory of 2788 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 31 PID 1740 wrote to memory of 2788 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 31 PID 1740 wrote to memory of 2788 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 31 PID 1740 wrote to memory of 2788 1740 a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe 31 PID 340 wrote to memory of 1248 340 ojfig.exe 34 PID 340 wrote to memory of 1248 340 ojfig.exe 34 PID 340 wrote to memory of 1248 340 ojfig.exe 34 PID 340 wrote to memory of 1248 340 ojfig.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe"C:\Users\Admin\AppData\Local\Temp\a86f81147abd5f480509100ae389b789eb600a404f173eebdec3b653a6daed62.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\ojfig.exe"C:\Users\Admin\AppData\Local\Temp\ojfig.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\dykua.exe"C:\Users\Admin\AppData\Local\Temp\dykua.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56c4708585b360860ef816d0d6d3b3655
SHA1a1f0a223f31a9fbc8e4fbe1baadc1861081ace1a
SHA256faafab5754a0cc58182156aef5d7dd79731fa10f990a12c534bc5849887a7cff
SHA5122c2db0f7dd2e805c99a0fb0f627dc0230d2ce508c9dfb16a203392439b87993380f8c3a107f8ccdd78ceb5266c811375970db90c11e2e366deb2b5ad7447793c
-
Filesize
198KB
MD5d03df720310e589e2e404a23852217b9
SHA1214e468ff7abeccd8bc7e413641147b6ba8ef529
SHA256e6045a0e903f03e750319c8a744426ebfb6f15b3222e2bbfa08a2461b80a1cbc
SHA51247ac1a89f66bcc8480b5e7cb31f75cc5ebd68f3c145c3d5400b8cafdbd9f4d9d7eb5a1ba2bd3328f01c86e457365028fc1bc06122e23a838d46c0a2363ae4a3b
-
Filesize
512B
MD5f0257b9a616db2683f87b48fc7c5cf28
SHA1faf4a3aa5c2f9c153e01b7b90d82425030df6254
SHA2565e65152e21158fad9ec57017a6ce729b1ee6300eee13d5c08ae89ea6fdb3a1f4
SHA51209585f1b27407455f17cd944ab172dbdf04cee9ed1e0126256e89392c6591e545e819594b44c60a8c3faebdb2ffeae99dcc7526e8065922637eecf50af0d643a
-
Filesize
467KB
MD5862ca105d0740a461e4d4ed15afc11d4
SHA1e698a0edf662ae30012ce542f84317921de95b25
SHA2560c77448158ec48e25336095fdbab86653b764e2d4028e6c75bc277e76b6d8894
SHA512a212616de614e89fe4ad3463dfe9d84809f682eb043ef60f70b0416be728b433f7b6f28b63fa9b0bbc94cac813dd7dce98918e02db26e055545cb068eed5a8e8