Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe
Resource
win7-20241010-en
General
-
Target
133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe
-
Size
337KB
-
MD5
39d8703f1b708b28f39401d39084363c
-
SHA1
d3ff0688c161c0829a07d65f17e618b805bc1cc0
-
SHA256
133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691
-
SHA512
45871b125f10e63a6f38c3612e757ae3a2fa0648bf1d0f49ef663882fbcbbf68aeb3805570a1fd834e805e681b6eea9611fa05574b9ce201946d77fbf06cfcd2
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYpI:vHW138/iXWlK885rKlGSekcj66ciEI
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2980 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ytwec.exepyxuf.exepid Process 2736 ytwec.exe 1784 pyxuf.exe -
Loads dropped DLL 2 IoCs
Processes:
133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exeytwec.exepid Process 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 2736 ytwec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exeytwec.execmd.exepyxuf.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ytwec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyxuf.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
pyxuf.exepid Process 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe 1784 pyxuf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exeytwec.exedescription pid Process procid_target PID 1064 wrote to memory of 2736 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 30 PID 1064 wrote to memory of 2736 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 30 PID 1064 wrote to memory of 2736 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 30 PID 1064 wrote to memory of 2736 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 30 PID 1064 wrote to memory of 2980 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 31 PID 1064 wrote to memory of 2980 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 31 PID 1064 wrote to memory of 2980 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 31 PID 1064 wrote to memory of 2980 1064 133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe 31 PID 2736 wrote to memory of 1784 2736 ytwec.exe 34 PID 2736 wrote to memory of 1784 2736 ytwec.exe 34 PID 2736 wrote to memory of 1784 2736 ytwec.exe 34 PID 2736 wrote to memory of 1784 2736 ytwec.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe"C:\Users\Admin\AppData\Local\Temp\133edd12d821bd362f2ad0693982abc59fba04af35ba0eec538d6cd798a6f691.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\ytwec.exe"C:\Users\Admin\AppData\Local\Temp\ytwec.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\pyxuf.exe"C:\Users\Admin\AppData\Local\Temp\pyxuf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5fa03093f919777d4b59a7d49d7440b2a
SHA11b4dcf5d738d48f599d613e34955a7b27b2996da
SHA256d78493474650eae90d361a0fbdb8c87ee8d017b2ccd8150097251a929dbae2ea
SHA51263320e32c15909edd0dc7100426b1e58175febf45ab280b1ad28ae5abdefc8d2746226573592f4878a170476273664fefcb21b8b2be4623ee8167f7f04189a28
-
Filesize
512B
MD5de1503721240a86d279ad99f6c6a5c00
SHA164b01ec15a58050dc5a7f0e5cc6c0487e7283a11
SHA2564024661823fcec274145c8b5ca48f0048696624e18ba19cdd09a55d201fafefb
SHA51250fe120433fa4ec640f4609f5511842ea1cb16c893bf043256cd1ff43cdcbb21b8ad291b77bac83339cf96578ea391c3d96fcf3ecdcf3a0eaebd4d7be0933ca8
-
Filesize
172KB
MD5e6af2374cf2038537d2e2c47513e2436
SHA174763632ebcff88746f851264794de82d9076235
SHA256ff4479160dac11da0dba98836d853ee66f2c0de41931be244373001d741b4c85
SHA5122598a955f49c4b5b984b98d4a5c0f8216dc40cf2b8529d1971c5cbd24b744a38d1e06fabd383a6c35c3b5670f381970ee146eb41aa61df025b2231f046d0e8d4
-
Filesize
337KB
MD544b7774f5dd49be7afde5a5a415321aa
SHA17a30263c295e98c8ffcfcbe8826f11017016fb35
SHA25600a859dc5d00e3fb4871baa18573f48d53a9de70ef6aac1bb78bd601a36dca1e
SHA512f9c29992d7e8a0a2cfb0e442ab2dcc2dbe2584cf943d0e43773f13151b3d24eb383242ac5caed08101cf58bb94dfa4de34850192e31e26012ee09c5f30639fe8