Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 03:58
Behavioral task
behavioral1
Sample
3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe
Resource
win7-20240903-en
General
-
Target
3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe
-
Size
441KB
-
MD5
f86dcb4311922e5e86616c5304ba2d19
-
SHA1
90a2443c818be2c5d347b74e41eda53011386b45
-
SHA256
3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38
-
SHA512
874524ea9560d72754092debb60c1962d717f4ca2a986713a40f32e6d99448e19200de54b32bad4034e4522c9ed4ed7cb52f13ae33eb4d186be1fcfa721165c3
-
SSDEEP
6144:oo3wBi+1Py3V0a2WkRNgi3caOHO5NjEwwiYWB5mV4Pzw9ygibGGM/:rKf1PyKa2H3hOHOHz9JQ6zBO
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2748 geryc.exe 2040 purez.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 2748 geryc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language purez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geryc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe 2040 purez.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2748 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 30 PID 3068 wrote to memory of 2748 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 30 PID 3068 wrote to memory of 2748 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 30 PID 3068 wrote to memory of 2748 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 30 PID 3068 wrote to memory of 2544 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 31 PID 3068 wrote to memory of 2544 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 31 PID 3068 wrote to memory of 2544 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 31 PID 3068 wrote to memory of 2544 3068 3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe 31 PID 2748 wrote to memory of 2040 2748 geryc.exe 34 PID 2748 wrote to memory of 2040 2748 geryc.exe 34 PID 2748 wrote to memory of 2040 2748 geryc.exe 34 PID 2748 wrote to memory of 2040 2748 geryc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe"C:\Users\Admin\AppData\Local\Temp\3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\geryc.exe"C:\Users\Admin\AppData\Local\Temp\geryc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\purez.exe"C:\Users\Admin\AppData\Local\Temp\purez.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD534075250eff8037ef38c111e5b2f6156
SHA155e3613916263ab6a8b1eef12234e7b27ec2ba0a
SHA25693f5f9f79fb2b0c7197b0e666c06645bd720fbd6d13784abd07c0d95b9a4ee70
SHA51251ac7d7dffef789a0250e4497aeba4a379611d92bda8e285f48571593d35bbb32d836452f80e0f07002eb6345292322831905dee21fbfe75d97efed6fa9f4bc4
-
Filesize
512B
MD5d729ce54978504303941234be868dcf2
SHA15962b73ba1091c7176afd51bbcab7099215af2e4
SHA256318b589564d279a556764dd39343a29c7117e8a988e3b7591245eac35a3511f4
SHA512e79481db52382764dc10feaafa87e35e9277a0032a86740db76dc19cb6da01a74dbbef15ab864c20ee3f4cdd0fefe6c6e02ec77586019ce319589c272eb07c7e
-
Filesize
230KB
MD5647e105d48a067e076c9159c97017e9f
SHA19bca458fe5e98faed418b49c7d13ee1758349d8c
SHA256b8bdec7f819a528cf8fcba4d993d0807085762369eadf78f7b3da1c7d35cbb3b
SHA51299d84eaa627ce5719b403cfab8b76714f89f65c0f7a2bc08d91d60f65bc33fcfcd94554cd9191d6b3839cf8a3e084087acd0bdb6a33477a1d973e68f98bdcb19
-
Filesize
442KB
MD53390d1a8ce6d453affac94d71a4e8df3
SHA1f9a0ae99bfd5ff5101d506f2080682126c40ab3e
SHA256182f3516acb2fe3b52209353990fe632ae117113f969f36aa975f86cdbbce207
SHA51210c96707c72d0aaab60bd9da29cd55cb0b41b2f64c6341e1cad093d013662bef80772aa5d93e49b0fb1ef3056a4aa3cc49ed38db29e9ba2ae7f703b884dcee4d