Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 23:55
Behavioral task
behavioral1
Sample
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
Resource
win7-20240903-en
General
-
Target
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
-
Size
508KB
-
MD5
9c5fb0c62ec811e3ee09c3c038c3f4a2
-
SHA1
965460b96e0039bab84553fc48a86dcc9530a827
-
SHA256
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c
-
SHA512
f367dc4f03ea54a0d5ff87ddade90a6c8b0e6e07c73d7c775c67221869a40a823e3edb3d66ecfdb7f4f4ceec3c96a310304ef07b03c53b72a4f1fd05822aa55d
-
SSDEEP
12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKoo:3MUv2LAv9AQ1p4dKJ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2744 tuhui.exe 2888 korai.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 2744 tuhui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuhui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language korai.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe 2888 korai.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2744 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 30 PID 1992 wrote to memory of 2744 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 30 PID 1992 wrote to memory of 2744 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 30 PID 1992 wrote to memory of 2744 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 30 PID 1992 wrote to memory of 2760 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 1992 wrote to memory of 2760 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 1992 wrote to memory of 2760 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 1992 wrote to memory of 2760 1992 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 2744 wrote to memory of 2888 2744 tuhui.exe 34 PID 2744 wrote to memory of 2888 2744 tuhui.exe 34 PID 2744 wrote to memory of 2888 2744 tuhui.exe 34 PID 2744 wrote to memory of 2888 2744 tuhui.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\tuhui.exe"C:\Users\Admin\AppData\Local\Temp\tuhui.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\korai.exe"C:\Users\Admin\AppData\Local\Temp\korai.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD55c1dd70bdbd4dfcfceea0531acb2cf8b
SHA15e45d5a1c99513e59435b399c8505f696166b313
SHA256b742d7d674f2590555cb69c78af2232cc5696d8e3a5abee68c68e26455008eab
SHA5128a9c00c7745a6c2c2e69b76edf0aa7e0b0d261b06e3a689a7b33a04425d2b925eb07372acb6be1ebcf9399cd24e22ae22312e60c60337023f8740b9365cc9978
-
Filesize
512B
MD52f7e8b0ea6c7e5bf47e5ea763b2b5369
SHA16ec359e00d9da7a2bd3f8b501852697d87066727
SHA256e12cba77cad75a6d1d6554e1f270fd8a121cc48880d63b2ed95278b1316889d8
SHA512cf03fe547e656f5ada9c7bf528bd9745ec9d7f29e225286e914b1730ddfb2965f7ea0665f2432ecec35986095dfbc279d6d0959ebe7557ef45c30c309d0e0b9b
-
Filesize
508KB
MD58bc9469925bed1944aae028ba8a3db34
SHA1660f6fa91abd9aafb42e967377f7760de25a453d
SHA2568850073dd0f74be6966e7a38a90f83656beab051d3fefbed7173a3076717dfe5
SHA512e0277322cf3698ddc4ac987911533c49aaf06df067570c3d0a7a5b7cc0f6d86d4b0181fea074523eba93de9204073cb6a4155ac5f34fc08e8accfd6646d3f8a6
-
Filesize
172KB
MD5e5c7a003f91bf5fd81de0014108cefe6
SHA1e67cafc4ff6b42aeb8c68629aed353bce3a7cc4b
SHA25603dad23d1c6a694282157d65cdd53a3c2a79dd637bf62368c39798985a73be9a
SHA512533c14acc6e4552a72c4e024d05663f9eb78aac9cad73b7e5fcc54bcd1c00db481745290ef1b036428a361913b5877b2ad367b090359675b51aeeef5824ee661