Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 06:47
Behavioral task
behavioral1
Sample
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe
Resource
win7-20241010-en
General
-
Target
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe
-
Size
348KB
-
MD5
93db11bb283279a3d520050cf0ef426e
-
SHA1
f98cb13e6c10407f866ebbc9cb41cac31a293485
-
SHA256
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347
-
SHA512
928217623428c6c85b86872ed5853faa07c0ffbbce829a1f17bf34aec3a47bc85f7557decf95d8d8f591bb3d919720cf1669a1e429750d2b52ba13fbe16ec463
-
SSDEEP
6144:c/bE5G5KiR0J0dCsnGb/6VOpLc91WlvhDSNZR:A0G5obGGraOpUWlpq
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2380 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
biahp.exeryxymo.exeodwyo.exepid Process 2892 biahp.exe 1824 ryxymo.exe 1272 odwyo.exe -
Loads dropped DLL 6 IoCs
Processes:
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exebiahp.exeryxymo.exepid Process 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 2892 biahp.exe 2892 biahp.exe 1824 ryxymo.exe 1824 ryxymo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
biahp.execmd.exeryxymo.exeodwyo.execmd.exe3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biahp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryxymo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odwyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
odwyo.exepid Process 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe 1272 odwyo.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exebiahp.exeryxymo.exedescription pid Process procid_target PID 2728 wrote to memory of 2892 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 30 PID 2728 wrote to memory of 2892 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 30 PID 2728 wrote to memory of 2892 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 30 PID 2728 wrote to memory of 2892 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 30 PID 2728 wrote to memory of 2380 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 31 PID 2728 wrote to memory of 2380 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 31 PID 2728 wrote to memory of 2380 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 31 PID 2728 wrote to memory of 2380 2728 3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe 31 PID 2892 wrote to memory of 1824 2892 biahp.exe 33 PID 2892 wrote to memory of 1824 2892 biahp.exe 33 PID 2892 wrote to memory of 1824 2892 biahp.exe 33 PID 2892 wrote to memory of 1824 2892 biahp.exe 33 PID 1824 wrote to memory of 1272 1824 ryxymo.exe 35 PID 1824 wrote to memory of 1272 1824 ryxymo.exe 35 PID 1824 wrote to memory of 1272 1824 ryxymo.exe 35 PID 1824 wrote to memory of 1272 1824 ryxymo.exe 35 PID 1824 wrote to memory of 1608 1824 ryxymo.exe 36 PID 1824 wrote to memory of 1608 1824 ryxymo.exe 36 PID 1824 wrote to memory of 1608 1824 ryxymo.exe 36 PID 1824 wrote to memory of 1608 1824 ryxymo.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe"C:\Users\Admin\AppData\Local\Temp\3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\biahp.exe"C:\Users\Admin\AppData\Local\Temp\biahp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\ryxymo.exe"C:\Users\Admin\AppData\Local\Temp\ryxymo.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\odwyo.exe"C:\Users\Admin\AppData\Local\Temp\odwyo.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5eab8cdeb2432c313cf894fecaa61891f
SHA118c946de296176c12a253b09782244d0b32743ee
SHA25604f87133dcb9c056a48337e2a1805bf605e6fb57116d90520d2193594f93b2bd
SHA5126b806a2e34affbfca2a36bb6d3c7a01d18730feb3e2adef2c91cbe19037d015142076e342aa62299756cd65d8a844cf8c120e0e66c7f90df9fb78d3afb9dadf6
-
Filesize
224B
MD55e75c301323d194df59243a5f01d9e4e
SHA110cae33f16d226e983e4f85563ae28cc2ae91ff0
SHA256f2c3986dafc50a1856a993503e905a4795d9b88e5daec5398b6f08dac8731e5c
SHA512d76c43f166c59879bea3379b29bc9dc7b9125198a3e0e29db4d7947ff08c40252a7abf839cfbd5f277364802e7f5df3262c47e295e5225da023d4a5924ca39a9
-
Filesize
349KB
MD5160092970417e7a40e9acd51e65d59dd
SHA1891e7eb00d6df0cad879d8682645812dd7d6dec9
SHA256080c1432085b318a480dcd9aa1b45147a39378388d5f7fc145cc1e25962177c5
SHA512002ac7a961988179791cc382cb294f54ae5e5149934ab903b34e733bddc63d869c947ea6364f1d57031c29ba402691ebe51c8ff8e6f6f7c7c81d2d58907b35ec
-
Filesize
512B
MD57d57282ba0706027541c4bd96d67aea7
SHA149ee928079853ae3c1fd6f185e95a288fbc89113
SHA256922c745e72b1116f11d542d6a382b1fc653da1df0c6f50aeef16a8b97de3161c
SHA5127f204742a4505868e2781980dd1336dd6353ef2257cfc9266fec8dee4b31ad9fbaedc4f5e0b9880f2aa9b275b7c4bb4c1ca2d9af1d989a7541986b0b1377d2a5
-
Filesize
115KB
MD522576843fd863242a67c062ec79b2d39
SHA18474706e12ac2319a9ffdf1a788f850878055c72
SHA256b7ab93b1d70a1225994b29193debcac470c5a9ea72bcdded366c3f191454d0db
SHA5121a36bf3d482e7b2753195d9617e24019caa3b7149a09c2a178f1ec43b33b1b41f9bd1fcae50fdc91d7b097d03b70d0c0651fb1fac7cabb722b069d13470143ff