Analysis
-
max time kernel
120s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/11/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe
Resource
win7-20240903-en
General
-
Target
2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe
-
Size
327KB
-
MD5
8683596a79ee62e258067bbadaa4e0b0
-
SHA1
2804b7a54623958f9feae3720d47cf43d190301c
-
SHA256
2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7
-
SHA512
776cf6027bfa30d32fb61e54cbed0e9a34a9e20e6645f83cf2e434952a7b9c641410b81ddd816570c41449ce30e90b33b21041d34ba43419526b9ff664fbc97d
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYQ:vHW138/iXWlK885rKlGSekcj66ciR
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2964 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2968 qoams.exe 536 liduz.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 2968 qoams.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liduz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoams.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe 536 liduz.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2968 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 30 PID 3024 wrote to memory of 2968 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 30 PID 3024 wrote to memory of 2968 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 30 PID 3024 wrote to memory of 2968 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 30 PID 3024 wrote to memory of 2964 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 31 PID 3024 wrote to memory of 2964 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 31 PID 3024 wrote to memory of 2964 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 31 PID 3024 wrote to memory of 2964 3024 2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe 31 PID 2968 wrote to memory of 536 2968 qoams.exe 34 PID 2968 wrote to memory of 536 2968 qoams.exe 34 PID 2968 wrote to memory of 536 2968 qoams.exe 34 PID 2968 wrote to memory of 536 2968 qoams.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe"C:\Users\Admin\AppData\Local\Temp\2a7b234f1ba3a62f0ff1b2c5a0ff8ae792e503fe487d689fa50f3bd1576628f7N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\qoams.exe"C:\Users\Admin\AppData\Local\Temp\qoams.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\liduz.exe"C:\Users\Admin\AppData\Local\Temp\liduz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD52692d637d7f78045fac9c30c287958a8
SHA1844e93e562fc43a9dd54f33dbbda9a45c563a822
SHA25692a03c86295ab5505d930e81c1e20f12a980f6d7b35072df17e6ade92a27c06c
SHA512697903d1820b0303b98af5a95cba388670e7bddaa83670260f5e21cafe534beb54e042ae265c9d03c82c5bda3bd5995b8e31e35193da7a1b62c97a07bc61e0a2
-
Filesize
512B
MD5f675fc6df2bff84785b4ddd27d6de3fa
SHA1c4a7a8d256dc7385cf924ba38c75e352adf67fe6
SHA25691fba69fb29afdd86812c6595f364fe34564b2186b86bbd6c061a8835186ccf7
SHA512c3d5c3faba392fe302834339b08b75410c8c6c940a2c9c25143d564dd80c1fce872c89f67028773cafdcb1ef4ed7ec9ce94a6633daebed09a2c877004ea55b7a
-
Filesize
172KB
MD5ddbb7726c3b6f8614e4ffa9e3cd93dd5
SHA1c26f955f61c23e04bf2318986cd26dbe3ef4ed01
SHA2565167361c647e4115ad5a7ae1d6fd81a56e069209b445e7f0a4b19ede0cfcecdd
SHA512c26fa117686d0d53bc12981a7011102c902b8d08f41229c29a17eceba1efeb638d984f293a167743706cb6e61e4ed8c657d57eaa13948f3e584e1ad5aeaf333e
-
Filesize
327KB
MD57c978e23d2d8f99d12e498e2da50e62f
SHA1b183ffc13c5ec1059ec6a56d1416b5e1cf672f1c
SHA256180e7afc98bc616ce069cff0c576fbae68fb7bfe536e87855fe348082489ddd1
SHA5126db579d1cec790ece2c0122054492d113a33500d5db720b37a9b5bc8f700c5162565bfa6eaa7e709e6bd29976e7fc4fc8d9d24c45fc0f18e88fd972028e1d78d