Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe
Resource
win7-20241010-en
General
-
Target
635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe
-
Size
331KB
-
MD5
e03c1b27b6239ebea9c12494b4f912cb
-
SHA1
a50459987dfa39124e5580ff86e8f25c71d512b9
-
SHA256
635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11
-
SHA512
cb720e4c0c66faed2098a2464c8518ba21fa874eda9d09bd57c9d4bfbc11382cfa2d001e53b7832b0b2b63c9f88ebcf3bb6d4312767e61f002e6381bddf460ec
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYMOFr:vHW138/iXWlK885rKlGSekcj66ciqr
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 828 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
lowal.exejowex.exepid Process 2144 lowal.exe 2336 jowex.exe -
Loads dropped DLL 2 IoCs
Processes:
635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exelowal.exepid Process 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 2144 lowal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exelowal.execmd.exejowex.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lowal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jowex.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
jowex.exepid Process 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe 2336 jowex.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exelowal.exedescription pid Process procid_target PID 1276 wrote to memory of 2144 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 29 PID 1276 wrote to memory of 2144 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 29 PID 1276 wrote to memory of 2144 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 29 PID 1276 wrote to memory of 2144 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 29 PID 1276 wrote to memory of 828 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 30 PID 1276 wrote to memory of 828 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 30 PID 1276 wrote to memory of 828 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 30 PID 1276 wrote to memory of 828 1276 635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe 30 PID 2144 wrote to memory of 2336 2144 lowal.exe 32 PID 2144 wrote to memory of 2336 2144 lowal.exe 32 PID 2144 wrote to memory of 2336 2144 lowal.exe 32 PID 2144 wrote to memory of 2336 2144 lowal.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe"C:\Users\Admin\AppData\Local\Temp\635c14e9039915b579be9cb60a92844ab22752f9ee4dead4a9cc89cb496c4c11.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\lowal.exe"C:\Users\Admin\AppData\Local\Temp\lowal.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\jowex.exe"C:\Users\Admin\AppData\Local\Temp\jowex.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d98649b4f98a9524d418f6db6f8a62ee
SHA1a17919e3b7075d8838509d2a734ba07cd25a90b8
SHA256bbb64a9ea757f086fb04bb74b2db5a2258b3059672828ff33fc2db142e5334c2
SHA5128f7559df132bed14b9624c48b5c01c0a0a4194343902f7c472a827f149afacdd9dc2eaf75b25cb9d34a7539672cb28f19c6fec6e2ac748270f5aa8eddc396d08
-
Filesize
512B
MD540276c3c7abf15a2e1ce7d932264a61c
SHA1d537f9e08f3dfc2c40a11cbd5c824bf30fb5cdd9
SHA25624a851f78f9d783b2b13782d109c806b46d8baa8abb8908d674f4cafdb204926
SHA512e6f8522ab3bb2c0aef6783fa523bb46af30f810a073ea401b9f851fcc67a66ecaced314bf394e9ab3dbbaace359c37f595ff93bffadceba0b5fb2cea412c489c
-
Filesize
331KB
MD5f7e58446512c51efac60e4d410218577
SHA10635a9bf9ea55a455ac47c22f6b21f10504e9d83
SHA25671f010c600ee5ea37745f410f7741532add29a9a340cd09804b7cf3d4278156d
SHA5128bda343fb0a08aa3460e2ee1d3c826560bbd8534c7f5cbb68ff4bb52dae3fe76d12a49730d903f6cc9900fa04e93b66b80a4a26556efceb3cb898dd037faf9ec
-
Filesize
172KB
MD54de629709134fd63f19c984bf54a1736
SHA143e5336ffdfe88a58efdc8995122a2ae7c5b8295
SHA256e39eb1f35ad1cdd8669a49e9e5a1148cfb0ee02d81f20c115ecf0b22116b8555
SHA5127dc268a8ffbd1478a21bd2728cc236e6f87276c2b4705f8113b9fc4a41fde6ecf2d875ea0bbd428ef779ff72409358b28a8581e43e107ca06a34d25d459c3cb1
-
Filesize
331KB
MD54753dee1b10157f1e3bd6895669dfe47
SHA197822caf70c703578f2523e264d4cc51d1b0c20b
SHA256e6be5a5ba5feb6eccd15999c3836688f5881185f9ee54b519403250ccd7a5ab2
SHA5121de7ac594e1d8ffb09c0a4f430dabdbd3b7fa6f701a3fd9d8b5157574ed2e4d263f35a270bbde44e0e2a8c083cfc77a9a9a4beb51437b1534cdd7b1eec62ea4a