Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 19:03
Behavioral task
behavioral1
Sample
cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe
Resource
win7-20240903-en
General
-
Target
cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe
-
Size
404KB
-
MD5
abe0b89899d9cc0a84ab562966c4b514
-
SHA1
c166ac96ccd31af9314b4cf22dc87800c3ad3481
-
SHA256
cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8
-
SHA512
b2097b97164eb3a06ac43e0881a7c89949fa55b029e734fd2cdff36acacb17219ed9787c21fb7f26a842afebabfbc4a1b8317b1fb45e5b8a5484dbac0739631f
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohO:8IfBoDWoyFblU6hAJQnOU
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2064 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1432 coisx.exe 2484 emroko.exe 2844 mujea.exe -
Loads dropped DLL 5 IoCs
pid Process 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 1432 coisx.exe 1432 coisx.exe 2484 emroko.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emroko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mujea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coisx.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe 2844 mujea.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1432 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 30 PID 1908 wrote to memory of 1432 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 30 PID 1908 wrote to memory of 1432 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 30 PID 1908 wrote to memory of 1432 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 30 PID 1908 wrote to memory of 2064 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 31 PID 1908 wrote to memory of 2064 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 31 PID 1908 wrote to memory of 2064 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 31 PID 1908 wrote to memory of 2064 1908 cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe 31 PID 1432 wrote to memory of 2484 1432 coisx.exe 33 PID 1432 wrote to memory of 2484 1432 coisx.exe 33 PID 1432 wrote to memory of 2484 1432 coisx.exe 33 PID 1432 wrote to memory of 2484 1432 coisx.exe 33 PID 2484 wrote to memory of 2844 2484 emroko.exe 35 PID 2484 wrote to memory of 2844 2484 emroko.exe 35 PID 2484 wrote to memory of 2844 2484 emroko.exe 35 PID 2484 wrote to memory of 2844 2484 emroko.exe 35 PID 2484 wrote to memory of 2828 2484 emroko.exe 36 PID 2484 wrote to memory of 2828 2484 emroko.exe 36 PID 2484 wrote to memory of 2828 2484 emroko.exe 36 PID 2484 wrote to memory of 2828 2484 emroko.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe"C:\Users\Admin\AppData\Local\Temp\cbd5f2b4a6435dd290f258de2ac39f554bff2dcd36fcf9d45e47abd3bdb91ea8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\coisx.exe"C:\Users\Admin\AppData\Local\Temp\coisx.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\emroko.exe"C:\Users\Admin\AppData\Local\Temp\emroko.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\mujea.exe"C:\Users\Admin\AppData\Local\Temp\mujea.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD51b46df8decd496516a36a3b0b4775cf5
SHA1d9e1cb1123ae97fe0b2cdb5864fbdee80ba31122
SHA25608be487b3099437b87492c6386b26c1408962876512f894c3c2563d2bf117f62
SHA5125bb7e452601f527cabf6cef8da9e8ba12c7647b5735fbaa12fdf977dd4801acf20dd6aacc6bebbcd189d2cd2a1a21a0f4c9121be00158fe00f3b0479e5c534de
-
Filesize
224B
MD5acf4652467490f4b400ab919d6345180
SHA1fea658ed59d3d766a613a3b32410a0f07b5c0412
SHA256628132de75c5ef7eadd98aff3b1162cf384b5e0cca49446bb238c1d621833004
SHA51209aa1ddfc27e238546852c6500ea33e0b431872b39f1ebcbd2ddff4805d9bcbfab696b8434e7586f0f7af6fe080640ba8e044ef2563f117ed87301abf623dc60
-
Filesize
404KB
MD50a1ea696a2f566540e79eb38fa33b43d
SHA125f11e009c71bb86c814290e58032f0232267bef
SHA2560450fbe39df6be9682851d4170dbe64e346af34acafb3bdbd17a607cf6e79bfd
SHA512499bd9c971cf9124829be89848081c4640f29468c5f8d685b6d5c1e09593f8b0832c8213d44057e0b017e85d9a2247ddd2312b78008ca26970070c81eb698c76
-
Filesize
512B
MD5f4421a571f9b0b475fbbcc1ab26a759c
SHA19234ebbf9825a9a34c2946bb193a262066945366
SHA256143b75ac94c19e28ca0f1314b81d9276b9f2ca7ac4387e751ddcf6669b573f7b
SHA51244d1ec96fe4e65d2d4e0b2ba580ad833feed6d48fd8120d04eaa780e53d8291acb3e5ea5c7866ec760926eebd9b2ef67e782ca47899a607a5cb64d85f75af25b
-
Filesize
223KB
MD53464de4e68addfe2b899c6826a2fa1a5
SHA1e28005d10ef30c6c9b3b3857c2bf811800c80f74
SHA256ba2cabd19c0dc66dd55486a6842d67f7c129e3f748eb3f3b2358302aebc31d31
SHA512b08acf93e60b8a084bc45e86d15cb9932a7bf8a95a475651a861037cdacb9785585a768e8febfb2006640876a1cb02577d0a0426932c5cb0cee829fdddfa3d07
-
Filesize
404KB
MD503a12baa440f2aadd5f066540b8abc08
SHA1cbb10caa9888a3e962b21351391b1a43124332f1
SHA256ccc5501d6caf9885e33f7997183b7635a719060e36b2ca818c59fef80b03a254
SHA5128c16e26c751ebbf2a3fc9317277367b0658f2990089e0f35265ee5700a2e81878b8892b168d5c2b2b23d81db57f8f775d0dfeab5ca1a148d3e3c5b39e42686ae