Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 20:15
Behavioral task
behavioral1
Sample
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe
Resource
win7-20240903-en
General
-
Target
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe
-
Size
537KB
-
MD5
d20fee1a424647bee9f78e3942ba37f9
-
SHA1
a2c0bf2a4ce15eb5a151eadd37a1d51e9e87e3ac
-
SHA256
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757
-
SHA512
9bb9a502cee133b023d26d23e28a1037cb41f896e5c80e7e97f6e78eec42e53dceae1fa7600a9cd0bb9adb73b06f28be6442cb1eaada08de9afff8571a2b0e5f
-
SSDEEP
12288:q0nPhglq2Uyt4R/b2G/0hznQGoexBU/NPH:q0P/k4lb2wKatH
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 3060 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
pyhad.execyxol.exepid Process 2444 pyhad.exe 1996 cyxol.exe -
Loads dropped DLL 2 IoCs
Processes:
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exepyhad.exepid Process 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 2444 pyhad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exepyhad.execmd.execyxol.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyhad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyxol.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
cyxol.exepid Process 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe 1996 cyxol.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exepyhad.exedescription pid Process procid_target PID 2560 wrote to memory of 2444 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 30 PID 2560 wrote to memory of 2444 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 30 PID 2560 wrote to memory of 2444 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 30 PID 2560 wrote to memory of 2444 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 30 PID 2560 wrote to memory of 3060 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 31 PID 2560 wrote to memory of 3060 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 31 PID 2560 wrote to memory of 3060 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 31 PID 2560 wrote to memory of 3060 2560 5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe 31 PID 2444 wrote to memory of 1996 2444 pyhad.exe 34 PID 2444 wrote to memory of 1996 2444 pyhad.exe 34 PID 2444 wrote to memory of 1996 2444 pyhad.exe 34 PID 2444 wrote to memory of 1996 2444 pyhad.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe"C:\Users\Admin\AppData\Local\Temp\5a25b6a022c98a9c70a3b38394370dd1c94a9f56593b5e8a167b0c6290e7c757.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\pyhad.exe"C:\Users\Admin\AppData\Local\Temp\pyhad.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\cyxol.exe"C:\Users\Admin\AppData\Local\Temp\cyxol.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5c2eb983e8ced9ab28290b9e78fa44f80
SHA1051ec107b9b7f56da21bd418b07489c414162000
SHA256ad3ec2686dea0acd066b44085130ef74ac8fc02ac49452d000045557bade23b8
SHA512df30a2c2b746442b37e4280e56605b0380a3f98bd0af45abb800f34cfd4fea33ace316131f1be74d0c1dcc720c29b4502d6a897a184ce9c89462b97d5a880332
-
Filesize
512B
MD5bc78446c5f5b65af28672f0618f7a3b2
SHA13ab7f788d174e93e3770f83ecdcd5686711e295a
SHA2563f7cd65fdf4221817668924b2e8bfada7bc1748f99dc08744baf1c9b9fddcb43
SHA51285aa186ac6f84984d47067b022dc1809dac8857726c274816e6b8ae4634ec3bd722284ebc81714a98897a1a4039ddcb7e5d867f0abc34d1193003af8da9937a7
-
Filesize
236KB
MD520474aec95514637f3624213870a3f81
SHA1c6ad58e6248a12ba8861575456e3ac1729c3120f
SHA25670c15a52ce02df2d199b7eaf0a583c5ffc8efbe69b1a73bdc87f045e210ef719
SHA512ee2658801814428ae60ac0f55aa510c39410d2fd2a4689dbc7a81038e9c72a70c10cd62c11aebaa11c347b536642a300c474b70e0eebd80f29f6dda243edaeb7
-
Filesize
537KB
MD50d5ac4c34279feb84d33dd0ea619c06d
SHA13e83c8a9da939228835838aee50c7f440a717a94
SHA256b43eadd1cc700e4383ef91171636285a8a0dadd2f035baa8a22abf4d6fde6e11
SHA5125e1971177ecb90bf0b45314c9156b68ddea13fa39d82057e86327bdfd38a45f2c8230b82b2d0eb885d4206219cd8751e1c56bf2cee49e0506f28b6230fa4f9bc