Analysis
-
max time kernel
119s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 16:34
Behavioral task
behavioral1
Sample
54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe
Resource
win7-20240903-en
General
-
Target
54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe
-
Size
466KB
-
MD5
2f4397a18a4deed68940ab94a69402c5
-
SHA1
d58a7d3a479d88bed63a43bfd3fc0c4d1ce66797
-
SHA256
54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d
-
SHA512
df9570e7dcb5e9c8c4ddb120476314d1915f118a131c8279580398d2294cf33088c511988af4202c23d241c9a1d95769f4be3b9ddf56d7c3bb4fe4d36276d40e
-
SSDEEP
12288:Y6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1Uw:Y6tQCG0UUPzEkTn4AC1+P
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2728 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
raxum.exeedloa.exepid Process 1792 raxum.exe 2432 edloa.exe -
Loads dropped DLL 2 IoCs
Processes:
54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exeraxum.exepid Process 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 1792 raxum.exe -
Processes:
resource yara_rule behavioral1/files/0x0004000000004ed7-24.dat upx behavioral1/memory/2432-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2432-32-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2432-33-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2432-34-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exeraxum.execmd.exeedloa.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raxum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edloa.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
edloa.exepid Process 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe 2432 edloa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exeraxum.exedescription pid Process procid_target PID 1648 wrote to memory of 1792 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 31 PID 1648 wrote to memory of 1792 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 31 PID 1648 wrote to memory of 1792 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 31 PID 1648 wrote to memory of 1792 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 31 PID 1648 wrote to memory of 2728 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 32 PID 1648 wrote to memory of 2728 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 32 PID 1648 wrote to memory of 2728 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 32 PID 1648 wrote to memory of 2728 1648 54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe 32 PID 1792 wrote to memory of 2432 1792 raxum.exe 35 PID 1792 wrote to memory of 2432 1792 raxum.exe 35 PID 1792 wrote to memory of 2432 1792 raxum.exe 35 PID 1792 wrote to memory of 2432 1792 raxum.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe"C:\Users\Admin\AppData\Local\Temp\54b7d5752fe4745aa4853a78ca45cc8d67822a83084970d3208a71416847f11d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\raxum.exe"C:\Users\Admin\AppData\Local\Temp\raxum.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\edloa.exe"C:\Users\Admin\AppData\Local\Temp\edloa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d9d1c0129faacec07ba85d406adb4457
SHA136202ad4e4d1e739939e74686cbed0ab2c7f8b7e
SHA25696fb8aa07f15cf2bf2f86a785c217b87c0db36766fe1f587b889f55aeee4830a
SHA512e65ea5329001a51197ad5311a0e3d30f8d07e9c2ed4d89101852cfe5bc2921b1a0f517fe51d07f7ac7cc577674cd4e2ed19dca3c444505738649f11c9afffb90
-
Filesize
512B
MD56be65604ab7b185327ad8d2b754ba3df
SHA11190da543731c034317adeebdc8ecb9233235896
SHA256612c306ddb853f2083fa169db9a79d54ff83472d04f98956cd76fe00f5fd7665
SHA512ff8c446cdd121bb63e46fb5ab365b0d71abb937ab70450a6523d942eec66040328dd92f9b658de37bae5f67e863bb45abf95cdc5013ea2df815ffd0158b9173a
-
Filesize
198KB
MD584cd8ec238bd8cea529e60d191ac34b0
SHA1f7b331b0f9116b4861aa3be783201356ccf610a9
SHA25632e3b460af1b7616499ea049564f752288fee929516719c4d7be840a45ae3c23
SHA512b186d2b3d26321cf8bad6ea048239b2a0c31b700e371c0aa84f5487caddd50f82c7052280be81b7bbe184937feaa68438bdae6eeb1ea21efbfa0457c86ac38dd
-
Filesize
466KB
MD5df6e88ff3f9dadd5905bfb4399a30419
SHA10da49e8c6fac08d492bcdf7ddeb9eaa166415b66
SHA256ad98d8972880181038dd4bdea9e1da97e17e1905f7c7ee29846683fab01d0978
SHA512e117df2b2f06f5b511352edfcb48dba6de0bbd99b8e152afe95677e48ff9f94630c169a64bf9925fbe3cdca521710b2318ef58a7d93647b429349bfd13a5cebc