Analysis
-
max time kernel
149s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/11/2024, 11:56
Behavioral task
behavioral1
Sample
910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe
Resource
win7-20241010-en
General
-
Target
910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe
-
Size
692KB
-
MD5
b53e591f1b41aab36a05fd560ec491ce
-
SHA1
683d8ce3f61a8b13f2b6803e8060d3708c6a61bd
-
SHA256
910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b
-
SHA512
e3b9e38b6409080b15bff22a1db0db9e1bc2a1aaee006e755add83b9a32d54d1b4340e423917bef1ae244f08223f2127faabaf65e923173f339783674f4cadc2
-
SSDEEP
12288:LUyI6hJQglQA0IWb8DmPySxEuBZDxywHBlP94jpguwDxXlZ1nr0:dVh6gl6Iy8R9+ZdnnP94jpgl9Bnr0
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2268 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1704 loufy.exe 704 laeqto.exe 2832 morub.exe -
Loads dropped DLL 5 IoCs
pid Process 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 1704 loufy.exe 1704 loufy.exe 704 laeqto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laeqto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language morub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loufy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe 2832 morub.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1704 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 30 PID 2200 wrote to memory of 1704 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 30 PID 2200 wrote to memory of 1704 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 30 PID 2200 wrote to memory of 1704 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 30 PID 2200 wrote to memory of 2268 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 31 PID 2200 wrote to memory of 2268 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 31 PID 2200 wrote to memory of 2268 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 31 PID 2200 wrote to memory of 2268 2200 910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe 31 PID 1704 wrote to memory of 704 1704 loufy.exe 33 PID 1704 wrote to memory of 704 1704 loufy.exe 33 PID 1704 wrote to memory of 704 1704 loufy.exe 33 PID 1704 wrote to memory of 704 1704 loufy.exe 33 PID 704 wrote to memory of 2832 704 laeqto.exe 34 PID 704 wrote to memory of 2832 704 laeqto.exe 34 PID 704 wrote to memory of 2832 704 laeqto.exe 34 PID 704 wrote to memory of 2832 704 laeqto.exe 34 PID 704 wrote to memory of 592 704 laeqto.exe 35 PID 704 wrote to memory of 592 704 laeqto.exe 35 PID 704 wrote to memory of 592 704 laeqto.exe 35 PID 704 wrote to memory of 592 704 laeqto.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe"C:\Users\Admin\AppData\Local\Temp\910bb791c2ad2c5bf54816b430b5f2500a572a70e2fa1a228c0e2fbcbe76f53b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\loufy.exe"C:\Users\Admin\AppData\Local\Temp\loufy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\laeqto.exe"C:\Users\Admin\AppData\Local\Temp\laeqto.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\morub.exe"C:\Users\Admin\AppData\Local\Temp\morub.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:592
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5fc0c687e429f4e6ce0ff0707d753537c
SHA14db0d027fb00de586a8b9205fd36b81606f72d72
SHA256417eda1fe2c91f5595bf8898777a7efdfe37dea6844397af6a2c9a19f4396292
SHA512ab460c48858fe0428923f0a696a36b12cd39a012e0e8d9ae97798a4ae5f1b601f1e982f48deac62eaf2f0a20f9d658b8e5ad68d0ba1a6ec72bce6ad12bb3cfcc
-
Filesize
224B
MD54ce4392cfa276381b5d6ce006daf3193
SHA1f8edcd9632a53166970759eba03da9382750a99f
SHA2561535c7f76a080b6537f4b9d3afc795e2c734d94eb07b8fb4f881c43c5a674777
SHA512e406b6f1c9050113615a841a873abce038b6b418f3abbe3975c7a36319211f2dda071b61339fd9ad206e60fa272b15aba64db1e0ab3043e220de756ed1d8cdaf
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5bf68d19b5cd08bc88f9ca0cc99eaebd7
SHA13458845c163f43347b2ca6d1ee85288d51c7894b
SHA256a626edbe96572a043adff15195592decc8914221cabdae5d3f402d4db93bc608
SHA5120c36b11138be6c94a0a21e262c0919a0ce3bc2b9d24ad82366a49bff61da2f30040c48bce3d6df04cb5eac6676cdf039785531d53ab7b2986bbe9d2c13abc371
-
Filesize
692KB
MD52f3076c4330f4c58b0d48996f9cb0ffb
SHA1c338b59e46a9e29a2d64835f627d109636e4811d
SHA2568af33d152aab0ab366940796d67aa146a5101d33f617213a5d87af3e42f87bd7
SHA5120b197512cc56d6b30d70e536b3a54838b0031b5c4995e01273dc1d9c4cb670e7feb2b06f9a5e5ccbee1793e3dc6cfab422b88aeeee7280f24923c1c0a08e88e2
-
Filesize
469KB
MD55063f97f06811733bf61227270256920
SHA1c8600924eedaaefadbfed638cacf3e9efbf5c72d
SHA25668bbfdd909c0d301f1e331a64204c82b6bb2c3c6c5497182c084e0c6b035d2fb
SHA51217f6fe5712e5b39c392097450c9a04bb17dc87c252a5668dbabf7d4fb298fd75d36c364ae9ca990b6ae53786f5aa71284e5c62e05a31a3bd115b57987ec8b4b1