Analysis
-
max time kernel
119s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 18:40
Behavioral task
behavioral1
Sample
2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe
Resource
win7-20240903-en
General
-
Target
2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe
-
Size
349KB
-
MD5
9702b572151322ec6add6c75e2714321
-
SHA1
db5fa995483243c855ea05496797d4d121d4fa65
-
SHA256
2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0
-
SHA512
c1690a85b45eca670fac4d94adf24b19a1c096374261e5cf1393d6d9cbed3dfff28ac57947120c6cff25c79dd8c8cb6abe396b30785b126c0e918185649c11c5
-
SSDEEP
6144:c/bE5G5KiR0J0dCsnGb/6VOpLc91WlvhDSNZD:A0G5obGGraOpUWlpm
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 3028 viifo.exe 2336 coryde.exe 2372 hikii.exe -
Loads dropped DLL 6 IoCs
pid Process 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 3028 viifo.exe 3028 viifo.exe 2336 coryde.exe 2336 coryde.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language viifo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coryde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hikii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe 2372 hikii.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3028 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 30 PID 2420 wrote to memory of 3028 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 30 PID 2420 wrote to memory of 3028 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 30 PID 2420 wrote to memory of 3028 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 30 PID 2420 wrote to memory of 2540 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 31 PID 2420 wrote to memory of 2540 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 31 PID 2420 wrote to memory of 2540 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 31 PID 2420 wrote to memory of 2540 2420 2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe 31 PID 3028 wrote to memory of 2336 3028 viifo.exe 33 PID 3028 wrote to memory of 2336 3028 viifo.exe 33 PID 3028 wrote to memory of 2336 3028 viifo.exe 33 PID 3028 wrote to memory of 2336 3028 viifo.exe 33 PID 2336 wrote to memory of 2372 2336 coryde.exe 35 PID 2336 wrote to memory of 2372 2336 coryde.exe 35 PID 2336 wrote to memory of 2372 2336 coryde.exe 35 PID 2336 wrote to memory of 2372 2336 coryde.exe 35 PID 2336 wrote to memory of 2136 2336 coryde.exe 36 PID 2336 wrote to memory of 2136 2336 coryde.exe 36 PID 2336 wrote to memory of 2136 2336 coryde.exe 36 PID 2336 wrote to memory of 2136 2336 coryde.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe"C:\Users\Admin\AppData\Local\Temp\2b8d846b8d4926a0c387ecc1c557336d4adcfe2d88857d6cabf4d95f1566b8f0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\viifo.exe"C:\Users\Admin\AppData\Local\Temp\viifo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\coryde.exe"C:\Users\Admin\AppData\Local\Temp\coryde.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\hikii.exe"C:\Users\Admin\AppData\Local\Temp\hikii.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5f84fed65cea974b07ec408ac3362297b
SHA14d556df9abe4a1fac6a37571e2393e50c52b264e
SHA25661a05b8ce3aeef049aaa6e1f54cbf3124a6495e31c62dccde02b81e2edc1caa1
SHA512bae84c3cd3da1e3a53d6cbbf7a24094778d487cca106655f6c30a0213dec1e5c53844171193d890225cc21f782506687b94897aa5bf5da61447ae710be860057
-
Filesize
224B
MD53120f5a2295addacf322970a39240453
SHA194a22ddf64d08026aaa48f8e407c0a66b6ddede9
SHA25661f8cff62a6dcbc9dc4d474c364798e647ddb9d8ebc4c4c1a3d2e16d181b92b9
SHA51206f31c58d073d455f3038701de90047d402ae0865cbd894514ff9e1931cc9c6cee020984199d747cc847828eaaa7422b37b666aa3a5bfac911db6794179eb55d
-
Filesize
512B
MD5d225c2e1d2dde24c8934dcfec1447b9b
SHA1b5212466f992d13f3861f332d51c34f115b573e0
SHA2563b6561931a327a2726cd644127556fbe824bc2eb4461de73e99947c5787747fb
SHA512ed1b210abeb67e1957546efdf0a0385b93a7fc6dc2d6810edd0109619b57e0e0f821b407daf3a780ba6fb6863f583cc6a825e71f333629258ad534e06ba10398
-
Filesize
115KB
MD5d62e39a345a2a99ce5191e1a36d3e246
SHA1bd957be2ba79c175dbc33541ef62d35af517fa13
SHA2565e64b87c063ae9eafe1c0e343a0c17fdd41fb298f3b5dfc2ff313feb35d5d4d0
SHA512e1330e13a5e46be2e7180bc06ab723410f730b8714cd09c2a99cf5af43c7159d62be214364a53a01f4a664ff73175840350d6a2080a88d63f9a553025314c4d9
-
Filesize
349KB
MD5412709f010580022786e0dc350fb98c1
SHA13bd78f760336f1d3ce1af1634a0333f179935a96
SHA256e7af2460b4be4bbf30ab30b09b5f26ba3d0bd8f7330369bc789e2f343fb7ea69
SHA512dd7e307eee5c8e378b76ff356207b05329ff538444394bb678e4974b0fdee8776ab83d6c45098487418abc24eaa490df28a36c9d17194fe67658880e68d2a2c3