Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 00:12
Behavioral task
behavioral1
Sample
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
Resource
win7-20240903-en
General
-
Target
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
-
Size
508KB
-
MD5
9c5fb0c62ec811e3ee09c3c038c3f4a2
-
SHA1
965460b96e0039bab84553fc48a86dcc9530a827
-
SHA256
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c
-
SHA512
f367dc4f03ea54a0d5ff87ddade90a6c8b0e6e07c73d7c775c67221869a40a823e3edb3d66ecfdb7f4f4ceec3c96a310304ef07b03c53b72a4f1fd05822aa55d
-
SSDEEP
12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKoo:3MUv2LAv9AQ1p4dKJ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2752 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
pikeb.exepuwuq.exepid Process 1668 pikeb.exe 2776 puwuq.exe -
Loads dropped DLL 2 IoCs
Processes:
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exepikeb.exepid Process 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 1668 pikeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exepikeb.execmd.exepuwuq.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pikeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puwuq.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
puwuq.exepid Process 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe 2776 puwuq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exepikeb.exedescription pid Process procid_target PID 276 wrote to memory of 1668 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 276 wrote to memory of 1668 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 276 wrote to memory of 1668 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 276 wrote to memory of 1668 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 31 PID 276 wrote to memory of 2752 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 32 PID 276 wrote to memory of 2752 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 32 PID 276 wrote to memory of 2752 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 32 PID 276 wrote to memory of 2752 276 716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe 32 PID 1668 wrote to memory of 2776 1668 pikeb.exe 34 PID 1668 wrote to memory of 2776 1668 pikeb.exe 34 PID 1668 wrote to memory of 2776 1668 pikeb.exe 34 PID 1668 wrote to memory of 2776 1668 pikeb.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\pikeb.exe"C:\Users\Admin\AppData\Local\Temp\pikeb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\puwuq.exe"C:\Users\Admin\AppData\Local\Temp\puwuq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD55c1dd70bdbd4dfcfceea0531acb2cf8b
SHA15e45d5a1c99513e59435b399c8505f696166b313
SHA256b742d7d674f2590555cb69c78af2232cc5696d8e3a5abee68c68e26455008eab
SHA5128a9c00c7745a6c2c2e69b76edf0aa7e0b0d261b06e3a689a7b33a04425d2b925eb07372acb6be1ebcf9399cd24e22ae22312e60c60337023f8740b9365cc9978
-
Filesize
512B
MD5271e94872754db039058b934a12bcf21
SHA15e724e8a50af34eed86532ed5dec6f4cba27cdcb
SHA2568bfa0e487b55dba9f6d46a67743867bba878c095d580783f1116e6449bd1cc58
SHA512e283fe7e6d2670732d215230d0512f214984894c90866dfb9f9fc0ebb0466c0a61b3103c1763d12f48a83e636775d1672769dec606bf871de72205bcd51f8169
-
Filesize
508KB
MD503e1bab40c0155c5dbf59f44378dcb9b
SHA19c151b13b15262581c83d44749a558bd78d7c6f4
SHA2560c721fe0cffc96f23e2af1c883c107ef2e770434ff2b111427790c1a2c788e27
SHA512e9e35a912ff0eaf87ce482da9f91462b388772ae9b5e826c2940d12e6c5b5faa608c6a83a8fc0ae854360fe1fe5773dc143ea21f5690332a469f104d7a9e91db
-
Filesize
172KB
MD5fa0a971ce68fd5d5ac6ce2ed3d833348
SHA12bcdbb5dd5e33976b3b695203ebb039a4a11a2a5
SHA2568f251602491545eda0f3285ada95f0025d68c70dd3adbd067fea06f7362ebd8d
SHA512f3598125fcfda7f23135a5545a17486a81364ac06bf8b80822c10787c001cdd85868acbb10e092596674c8431679007009986dac2d409336395ac46176704c1d