Analysis
-
max time kernel
149s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/11/2024, 17:57
Behavioral task
behavioral1
Sample
a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe
Resource
win7-20240729-en
General
-
Target
a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe
-
Size
557KB
-
MD5
7fe3c05a108db999797fe06051691586
-
SHA1
2b44f9d07a02e336dc6c9742b064a21340cedc88
-
SHA256
a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280
-
SHA512
e95fb30851baba7b2076ddc18fcca1d63dbbb9c602082bab3c010073cdfeebe10a71c88c55601cbb84f175ac3a2f8d9ddbe7141c1b6ba208b8606ac33a24c471
-
SSDEEP
12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEyT:znPfQp9L3olqFT
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2504 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2452 hevud.exe 1840 xosut.exe -
Loads dropped DLL 2 IoCs
pid Process 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 2452 hevud.exe -
resource yara_rule behavioral1/memory/376-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/files/0x0009000000016e09-17.dat upx behavioral1/memory/2452-18-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/376-16-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2452-21-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2452-27-0x00000000031B0000-0x0000000003244000-memory.dmp upx behavioral1/memory/2452-29-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hevud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xosut.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe 1840 xosut.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 376 wrote to memory of 2452 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 30 PID 376 wrote to memory of 2452 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 30 PID 376 wrote to memory of 2452 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 30 PID 376 wrote to memory of 2452 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 30 PID 376 wrote to memory of 2504 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 31 PID 376 wrote to memory of 2504 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 31 PID 376 wrote to memory of 2504 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 31 PID 376 wrote to memory of 2504 376 a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe 31 PID 2452 wrote to memory of 1840 2452 hevud.exe 33 PID 2452 wrote to memory of 1840 2452 hevud.exe 33 PID 2452 wrote to memory of 1840 2452 hevud.exe 33 PID 2452 wrote to memory of 1840 2452 hevud.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe"C:\Users\Admin\AppData\Local\Temp\a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\hevud.exe"C:\Users\Admin\AppData\Local\Temp\hevud.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\xosut.exe"C:\Users\Admin\AppData\Local\Temp\xosut.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b3ce5c1b79472fa7760a9cc0061075e5
SHA1821a121ce2e23654efa7771d65fbe33bbf096eea
SHA256cd5eb434e04e6db59d9d7be262689599ae0217ee48a45483f347106eb6a9f005
SHA512184dc97c249581b992a5d81d819e8aeacd93b30f355afb2b32bbd2e4cbece549ecfab409261ecd2575659f2fa85340e7abf940e275a7c1b16bb2b8343345d009
-
Filesize
512B
MD51a6802a7835dc3b707792faf8d4e915d
SHA17e529b80129d3f119de76c4210d8aaf8d613e10b
SHA256d43b67a6ce18348fd11f353730185f0eb8618f705bfbf0aca7c6d5932c2a8bd6
SHA512c7a757a2fa52434851c359fb256a7fb495ecf1f6960def239773644ea3384e581d9ae4ebd92b2fc89155a0724decf362ef186b157ac94ab924c1b4b03053b88f
-
Filesize
558KB
MD5a84d5e5b46ccb2c48bc31dc096efd494
SHA1c2ad85613a88a7d9ffd616cec6a34dea349df5da
SHA256d0ae3a9ca6fec5872fd3ea83a3439def8f9af3e92d1ee48fb5b908d106af66df
SHA5124232599c3c5e678660882440adf94adc9d48e5547c84d3da7bb4521764cf7aecf0051040c803161cf55f3b51b06c6f1eb1c442516d03f6214ac0319150523b30
-
Filesize
194KB
MD53014780d4ced05b7e849fa2446f6274d
SHA1fcedca52bc73c205a0a922b8857cc0318abdf86d
SHA256d57b2d30fc998cb30e628818819d71a6abbb0c25f2d76ca47b35e962860a4197
SHA5126c69b4772c7c86bc2a0358ce2a4f016a4b4af1d26cc7a666bf645743b98fec7af25ca1dc18c1fb372a256ceb9237edbe73bb0321ce9b430142de92b7b9ad803e