Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/11/2024, 08:44
Behavioral task
behavioral1
Sample
2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe
Resource
win7-20240903-en
General
-
Target
2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe
-
Size
411KB
-
MD5
0168177624f8cb458832f644a1cf89ac
-
SHA1
8c1bf2eb9215ed595608cc7927ebe61ca35814eb
-
SHA256
2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b
-
SHA512
2af517a8d566c6ce794548afa987eadad7cc5e27b67e6c6bd13ee71cf39351f2c647a9784c99abf42e835d2c9fed4530b64fa3674fee9d507db2e8e4ed0e0d6b
-
SSDEEP
6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOYC:eU7M5ijWh0XOW4sEfeOX
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0012000000019237-28.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 zukio.exe 1100 ecaht.exe -
Loads dropped DLL 3 IoCs
pid Process 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 2828 zukio.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zukio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecaht.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe 1100 ecaht.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2828 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 30 PID 2336 wrote to memory of 2828 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 30 PID 2336 wrote to memory of 2828 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 30 PID 2336 wrote to memory of 2828 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 30 PID 2336 wrote to memory of 2808 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 31 PID 2336 wrote to memory of 2808 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 31 PID 2336 wrote to memory of 2808 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 31 PID 2336 wrote to memory of 2808 2336 2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe 31 PID 2828 wrote to memory of 1100 2828 zukio.exe 33 PID 2828 wrote to memory of 1100 2828 zukio.exe 33 PID 2828 wrote to memory of 1100 2828 zukio.exe 33 PID 2828 wrote to memory of 1100 2828 zukio.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe"C:\Users\Admin\AppData\Local\Temp\2c4198210341481900aba4dc38fe997671b8ecdf77f8dc57f54174eafd4a284b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\zukio.exe"C:\Users\Admin\AppData\Local\Temp\zukio.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\ecaht.exe"C:\Users\Admin\AppData\Local\Temp\ecaht.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD58798a36d6997c132e79120602a5aa447
SHA11fcacc0f4355a675e7672168950a89a8ce0f86f0
SHA256cabf3c88094b6e3ae71f28e100e6ece1d103b8c9b02aa8fff45af31a18b49321
SHA51297a8de3130c4d6cdf676361331349dbc0611ea8ca78f6b57b04df80581b92c48bb0f5e74992cb92593a78e96d5268364e47364262b394300fc4965fb5660414c
-
Filesize
512B
MD508012457d907d2bd403857eaf212ee5f
SHA1c6ee70620d3c409ceeeba37a5a1a5abae76fb271
SHA2563f48f59162e87385a775c55ba96eb3a3ef1acb48f7eaa79642fd834c208330d1
SHA5121bd70e64bb1c0e8faca7d9e5de6e16f4cbc266ce4318b4c422159d484748ad84e03b3a1242874f987d4a79942e149c155587935d9cb556cbe6cd5ff2ebaceed7
-
Filesize
212KB
MD51d941e3540eec3cc06491636f2957c41
SHA10231b370a8ab023c54633df1294308e2a3086477
SHA256fe7fe8ed2588bbfaf5deb28d7679d90a158bc7c04105fde969cbfebf63f73c2b
SHA5128b57305f4df92452d0ae627721dcf3c6d05147bfcca0385267da04a3ab6961b2acd785d7376bf79ca0da720809e664cebe92e3d9141cdd6ccfffb1cd7b63ae92
-
Filesize
411KB
MD5931e2c719b580c4f5853d57ea5fed5bc
SHA17acd3542b97e982325d4ef4c6e163d767affe9a6
SHA25622fe54c0e4c14861dad9e768b6da53a9290c274f95da7fae5c8279393fb1a638
SHA5126a34218e6e435297fc2a2a1ae19faf23379fdef6b0791c9043a61f346fe9924bdb10831ef6f6daa7938f27a074c0701d9765911e5acaf18fbcd668c736523dfb