Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe
Resource
win7-20240708-en
General
-
Target
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe
-
Size
331KB
-
MD5
7eee5a9c09ab106a678b4e266607e694
-
SHA1
7a4f8588d6089f4b8e25582bc11dfa9e1302df84
-
SHA256
9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb
-
SHA512
4ecb3d5966d401af3b4969563e8ccf3157c63b56a48b829d70eded05e7f1aee8a13241393363f6f62a73daa868a2e864dce2ca95b85190ba19ca59de1c9e5f9f
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVRJ:vHW138/iXWlK885rKlGSekcj66ciERJ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2340 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2208 iftia.exe 2976 kiwus.exe -
Loads dropped DLL 2 IoCs
pid Process 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 2208 iftia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iftia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiwus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe 2976 kiwus.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2208 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 30 PID 2432 wrote to memory of 2208 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 30 PID 2432 wrote to memory of 2208 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 30 PID 2432 wrote to memory of 2208 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 30 PID 2432 wrote to memory of 2340 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 31 PID 2432 wrote to memory of 2340 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 31 PID 2432 wrote to memory of 2340 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 31 PID 2432 wrote to memory of 2340 2432 9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe 31 PID 2208 wrote to memory of 2976 2208 iftia.exe 34 PID 2208 wrote to memory of 2976 2208 iftia.exe 34 PID 2208 wrote to memory of 2976 2208 iftia.exe 34 PID 2208 wrote to memory of 2976 2208 iftia.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe"C:\Users\Admin\AppData\Local\Temp\9f1dddf78603182cb7486028fdc50f5115382ea331a21b88102b6da352780bfb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\iftia.exe"C:\Users\Admin\AppData\Local\Temp\iftia.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\kiwus.exe"C:\Users\Admin\AppData\Local\Temp\kiwus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD56357433b9e289fbeedec0c4e4ea64826
SHA1b1e70d0a33000976fee37bd86ec4b4941fe0e670
SHA25626310e4f8e01c3574aee93d0394314e49692bb70bfc4562d80d09b66adb46428
SHA512af021ae4d737d676154f27f5478f91afe8e29993abb71f4b82d2c04a62e4388323c5ed3bd6737f696f691828c587be114cda834375db1475e79e10a0e55b0ad3
-
Filesize
512B
MD54072ee55660b9a73d468cb98b6a6fe44
SHA124503ca4b5ecbac697f7844ca6381201c6f6c4d0
SHA25612212e6738f6a7cc342bd28315a976dacf63816132b00f18fe0b7da6e7bf0007
SHA51293fe5bd21c2cc129ffa6aa7588857fe8a4108bef9344968b7e1ed73779d97eab6f6ba47730f6db8638527b18af1b66d3af9989fd65b160a3299a1196d182ebd7
-
Filesize
331KB
MD54e0c5c475faabd458cd71c0ffc94620e
SHA1707d5dae2856b9d302732601241c6b2da583a45e
SHA2565ee1b3b6af5f22e2761f973a5f6575f9129d89a69d56d95d389bdb69b9c5351a
SHA512b3fe5a9e56bc4503a8126a406602ea9660d9be934cf8b317785576319c2d274124b5b68b32ed34f8be172774e333618f89c79d8d4d254c865024ada2c91c118d
-
Filesize
172KB
MD5aeeb3eaedde6f26004d5cbab0cc82785
SHA19b1401f11224791a731c9e2a8ef3e7306230a4e9
SHA25663f22389383b3065469710c55e06b93c73bf8cb89a9ec7a9bde1461b082f5f5a
SHA51244f8d98b0bdecfe6f23258e3123755ba8cba3bd2d5d374bae706a6cbdfd111fe7e162620156d82c03ae30831d62e8333f1ac709d419810cd7bdbbd5289a95685