Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe
Resource
win7-20240903-en
General
-
Target
76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe
-
Size
335KB
-
MD5
1994411db2a21790dc2895b8ad664790
-
SHA1
2c43b49f603134d83d3a2214bc8b4e2246903606
-
SHA256
76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bc
-
SHA512
f4e000122fc2be4e5a2701fde16a0ce3b3f722a26d9bbf8a70b19be81dd6f85f4c5733c6ca7ddc719c2e34c33899e5440149d36e48aff63f86ddddac78b7187f
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYwL:vHW138/iXWlK885rKlGSekcj66ciVL
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2316 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
jaati.exeuqdew.exepid Process 2996 jaati.exe 1740 uqdew.exe -
Loads dropped DLL 2 IoCs
Processes:
76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exejaati.exepid Process 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 2996 jaati.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeuqdew.exe76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exejaati.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqdew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaati.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
uqdew.exepid Process 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe 1740 uqdew.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exejaati.exedescription pid Process procid_target PID 2400 wrote to memory of 2996 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 30 PID 2400 wrote to memory of 2996 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 30 PID 2400 wrote to memory of 2996 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 30 PID 2400 wrote to memory of 2996 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 30 PID 2400 wrote to memory of 2316 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 31 PID 2400 wrote to memory of 2316 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 31 PID 2400 wrote to memory of 2316 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 31 PID 2400 wrote to memory of 2316 2400 76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe 31 PID 2996 wrote to memory of 1740 2996 jaati.exe 34 PID 2996 wrote to memory of 1740 2996 jaati.exe 34 PID 2996 wrote to memory of 1740 2996 jaati.exe 34 PID 2996 wrote to memory of 1740 2996 jaati.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe"C:\Users\Admin\AppData\Local\Temp\76cb6893f5462623a527d0aa8e71f2eb1f68623ae9c5ce7b28b091043e8dc3bcN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\jaati.exe"C:\Users\Admin\AppData\Local\Temp\jaati.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\uqdew.exe"C:\Users\Admin\AppData\Local\Temp\uqdew.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5f4841529eb3c6784bba677dc9e2f2f81
SHA1cddb0f10e10355192e1c5cd04c5a5502cbecea9e
SHA2568c88be8f914f78e8b1da1fc305af56a359eb0f212062f55659a00dc96f650da1
SHA512cdb66869560b0115ad341e5aab15b3b48c004fadab54bbc39daa0395caf7deae599cc681aaee6bd39157c92bdcea2068dd918e4cc3a07f83d4bef37ac160982b
-
Filesize
512B
MD52465d148a8676ea3b57cc7029b45413e
SHA18ac06e4d6e7b8cdf15fbaf6925a6c7473fa63e41
SHA2569aa0e0d362ff38a767da3f0e2b71d98fce0925aab92f268e2f3259ff851506ff
SHA512d9857292f2ac6ed5f96837ff44625ae54aaa1cd372b6dce9938e666a0a949c33bb8c9c4f92c492d95793e224941a8ed0567915b150f018c8074401bdcc4377b7
-
Filesize
335KB
MD59620fe6555e7bc4636925900659ab76d
SHA10ebde76e90fc57bab9721c41db43004125a07b5f
SHA25607163689b4527832f1205bb9712b0af65ee6c5f716bac8386636f7df8907efdf
SHA5121763be9c1c797562b66da1a831c4494df542cd09fe4b193ee1d9dee1b015ef2e40bbe0179ef1fdb54326c23594a8bfe4772b5eb29d3de38768e8137d887f1397
-
Filesize
172KB
MD5b6f75386374e0c08e21ff47289b60242
SHA1c6a815d4650fc5bd001cf153c6658a3cc4505a11
SHA25613317ec1e6892364c8f3cbd106a8476ef05085afb468a740d317352082bab9a8
SHA51207e4f785ff667234e33378f4cc9c02be6c1ea8e3797974e938f56842b691c3ea26d3c23c96abf49afa2356c2256c4bb4f9b1eb0dfc82bd1a186960df86507e7e