Analysis
-
max time kernel
73s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 14:41
Behavioral task
behavioral1
Sample
6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe
Resource
win7-20240708-en
General
-
Target
6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe
-
Size
287KB
-
MD5
da93eaa1ced6f1b2cebba50e26071d67
-
SHA1
4b5c0d50b73fc44f136b3e01bb0425d1e10894e1
-
SHA256
6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b
-
SHA512
577c4735f9464b0ef2c8d0acff668f727aff30b37401d92bf15be1b5e45278ebbc70e6bdfa217b5fa009d62bdb839abe3004eb3e73d67f66ed1923e27e8a17dd
-
SSDEEP
6144:vf0WBaLjBbjftxoSpj/ZQUWvYqDUbsbX6EdK77RXW7VGwrLO8O7+:vMJj9/oSFWUWvXbX5g7pW7JB
Malware Config
Extracted
urelas
121.88.5.183
218.54.30.235
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1836 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1544 sander.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe -
resource yara_rule behavioral1/memory/1700-0-0x00000000008E0000-0x000000000097C000-memory.dmp upx behavioral1/files/0x0009000000015f6d-4.dat upx behavioral1/memory/1544-10-0x0000000000170000-0x000000000020C000-memory.dmp upx behavioral1/memory/1700-18-0x00000000008E0000-0x000000000097C000-memory.dmp upx behavioral1/memory/1544-21-0x0000000000170000-0x000000000020C000-memory.dmp upx behavioral1/memory/1544-27-0x0000000000170000-0x000000000020C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sander.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1544 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 30 PID 1700 wrote to memory of 1544 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 30 PID 1700 wrote to memory of 1544 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 30 PID 1700 wrote to memory of 1544 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 30 PID 1700 wrote to memory of 1836 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 31 PID 1700 wrote to memory of 1836 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 31 PID 1700 wrote to memory of 1836 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 31 PID 1700 wrote to memory of 1836 1700 6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe"C:\Users\Admin\AppData\Local\Temp\6647ac98d5694e6dd92c9de91bc8e0f0f1e3d93a05c4957cbdfdcc47791b1c1b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\sander.exe"C:\Users\Admin\AppData\Local\Temp\sander.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1544
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD5043eb9fa0431ab58f921ec0c05747bb2
SHA1afa592fd022390dfe4e56e3294dcc946318dae2e
SHA256d819ef7bef66fa2b987ae83a108ca8e5cf2caacf489d500ee48b9f4e3e5ba04f
SHA5120973278b521ee5541ce0f7145b90162926f02798a7660d123ab727eba6f65cf47e2def52e1408178014800cdfd30b156c87431caf24b418867039bcd2f5909ff
-
Filesize
512B
MD5c7c76dea547f2562c2a20d650e166582
SHA131c402fc0ac529e367327b075d2b7ef914896d9e
SHA2560fdb7f65bd7be2c3d7cce8d13f51572b3809042a6dc0051fdbfb945851a5e9cb
SHA512b006e74309e1f0370f65e1429d02a8040caddc668db9bfcec01c3793a1e05ef2df4266c97a8eba099966b8b59e24c2eaa087a094ff0bdd8d58af4e8bc9a3834d
-
Filesize
287KB
MD5f918502bb5c19414180710a2c8558b82
SHA15da0d4f4a8f32c4e879fd72f78a2f6faaebf09a1
SHA25641b619bff72d43c649e04f9dd22ded70444c23d4d40259fb895b2929ad8dfa20
SHA512c19487de98bfc576017af7a37445d49d925921cc39f8d2d54fe0a3e1a508679b41cf2e2b9d1f5f7a784f56b79e5fee298b7ead480969aaf3a528dfa185982818