Analysis
-
max time kernel
150s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe
Resource
win7-20241010-en
General
-
Target
07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe
-
Size
330KB
-
MD5
0287a47c2cd95341f1ab1b29438eac59
-
SHA1
228e48db10142555d09e612015cc860603df4aed
-
SHA256
07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca
-
SHA512
c3e45428955053a8529237f908b711cc2ece3487f284ea92824036ce1080f2071447829040dfae389e6ccf15deddf220ba92998ec60ad95370c33562c567dbdb
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYMOF+:vHW138/iXWlK885rKlGSekcj66ciq+
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 740 ojbea.exe 2044 weabo.exe -
Loads dropped DLL 2 IoCs
pid Process 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 740 ojbea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojbea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weabo.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe 2044 weabo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1084 wrote to memory of 740 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 30 PID 1084 wrote to memory of 740 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 30 PID 1084 wrote to memory of 740 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 30 PID 1084 wrote to memory of 740 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 30 PID 1084 wrote to memory of 2924 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 31 PID 1084 wrote to memory of 2924 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 31 PID 1084 wrote to memory of 2924 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 31 PID 1084 wrote to memory of 2924 1084 07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe 31 PID 740 wrote to memory of 2044 740 ojbea.exe 33 PID 740 wrote to memory of 2044 740 ojbea.exe 33 PID 740 wrote to memory of 2044 740 ojbea.exe 33 PID 740 wrote to memory of 2044 740 ojbea.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe"C:\Users\Admin\AppData\Local\Temp\07fc5dee5d8f828ce366aafc33f0a66df73876b8a4a350cabd1a52ae540c6bca.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\ojbea.exe"C:\Users\Admin\AppData\Local\Temp\ojbea.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\weabo.exe"C:\Users\Admin\AppData\Local\Temp\weabo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5771fa4d03ae459e185d1571c142745bd
SHA1b767e9597db7cf75b4d012762fbd9f53d99bf862
SHA256417291890d62c7ae0804026988b90379fdc1c5d05c8d04bafe89a2b32dfd4c30
SHA5123865ff0477f1d8679fa0e71ae76ff31a9512e23b10513bd0cc58bb58d81d60a1c1c35c26aa68673a74b0fd76052fdf797935bfd30f8f9590a83adc82e42f475c
-
Filesize
512B
MD5e52e80bf2321de5db0da018076f3aae2
SHA105a47c0a2537cae579593cb7ba80548af96e802c
SHA256eef15a9737f9e677cf3a20dee7c2a84b8bb99f65e54ce408d71635f182032cda
SHA512639c08a140fe48e34e51b89a1f4aff9020b2f3ef2c9791000643214c711f84164427200d8d313e86720b44323635922cef0a6f772b17e5ebf26f803ec1d5d375
-
Filesize
330KB
MD58cb3ef2855f4edb4e8f2def9db7f2c2a
SHA12796d296b75a5f145cb5a573c74f225a4c3bc45d
SHA256f5f67ce8183b6e0009019073d03b154ac983e8e2edeffab2fc89d90193730ccb
SHA51274bd67a522ef2489c814276f864544900b5f6b1cf08b0a8015e4cfd7a3dd00d66ab3c3644ed7c49df8d6e74ebf0b629f6c4a950e34258fd9fa0e9322bba11536
-
Filesize
172KB
MD57ef03513686ccf31b3374525a57fa9be
SHA1fc795e3186abd30966e4a3fed419d72164d4f9d5
SHA256648473a82d00593a2a28c78ce830c319bc72283e2b63fa35c55bddc927959ca7
SHA5124e1ef60225670728ce44368d778b2a478e2d4e715ed62a773558a818e12934d4e0c4cf510b1dbb4d6a8f3d60119a7c85b9c4a50921d4c89298973e90e608cc0f