Analysis
-
max time kernel
120s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe
Resource
win7-20241010-en
General
-
Target
fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe
-
Size
335KB
-
MD5
714315fad3e335b5c939b4a8e0b2fcd0
-
SHA1
7bdfff1f79148b07533a1cb44297ca9f7b61baca
-
SHA256
fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69
-
SHA512
70dbaa0e86243871e9872fdefa6d7d1b49777ebee96316812b40f9c53b0cb32278be6501a4f8729734c04e243ad726f08283f6ee59970dfdeee4307942eff86f
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIQ:vHW138/iXWlK885rKlGSekcj66ci8
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2992 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
desya.exepizyd.exepid Process 2200 desya.exe 2408 pizyd.exe -
Loads dropped DLL 2 IoCs
Processes:
fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exedesya.exepid Process 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 2200 desya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pizyd.exefdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exedesya.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pizyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language desya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
pizyd.exepid Process 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe 2408 pizyd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exedesya.exedescription pid Process procid_target PID 2536 wrote to memory of 2200 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 30 PID 2536 wrote to memory of 2200 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 30 PID 2536 wrote to memory of 2200 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 30 PID 2536 wrote to memory of 2200 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 30 PID 2536 wrote to memory of 2992 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 31 PID 2536 wrote to memory of 2992 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 31 PID 2536 wrote to memory of 2992 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 31 PID 2536 wrote to memory of 2992 2536 fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe 31 PID 2200 wrote to memory of 2408 2200 desya.exe 34 PID 2200 wrote to memory of 2408 2200 desya.exe 34 PID 2200 wrote to memory of 2408 2200 desya.exe 34 PID 2200 wrote to memory of 2408 2200 desya.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe"C:\Users\Admin\AppData\Local\Temp\fdc6c9e29a51b677a545312d15efc66907a69d56ba13ae06bcbfbe49cbca0a69N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\desya.exe"C:\Users\Admin\AppData\Local\Temp\desya.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\pizyd.exe"C:\Users\Admin\AppData\Local\Temp\pizyd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD51884aed314a1b1d92aabe4ca9abd3232
SHA145f21b5d7099a1795f0e6f91b322b45e33a9254b
SHA2564d6d01a4f1d837e820add08398950d383dffbfc15a729520bca482aa2b7b436a
SHA512d67087f32b0fa3a8d756139a678841ea9e4d2c35e115bc9cfc7cf15137cbb411f7e5b93aaea5597e43ee6773ac7b940d6aaad5d2bb942889a99e415ce2a8a457
-
Filesize
512B
MD5c3233868c26e87e935259cc053941b19
SHA1df0bbf16b1c9873653a8138cd41df702f6f49b05
SHA256baabaae6d2b8611ec956fb4ab613792c97f34cebf6510479db06d69b4d600732
SHA512e1719d4460c33d2cb26939f5e299888144612211fb23723a335cc054837892d87aade6ce1849e4a633900613975720117643626f3ae9ce4a0340392659e20423
-
Filesize
335KB
MD5c1036cb6712d18032a43099c7619a537
SHA1a407affe08d9f254ae087d5b259918302d6e35fc
SHA256950c504d6208217b3d4b0794177c57983fa9725d0ffbc1dd4f2c34149a332a4b
SHA512cc0450d77331b3c098fc4dfb69b8321e4d5ead595fdc73dc9a89c9aee30b26cb168bfb2913dc3681966ef10ecfb63f215add113c62a24ebf43f78b7784fc46a8
-
Filesize
172KB
MD5a819e5ca90a12e5e648c2c9e92e05d75
SHA1669192cb0041653df3d9f0e8403ca059001a16dc
SHA256c16ec9ec4b4b640ebf5f7cea8928ec676e360c88d445502b57327ae930b997f9
SHA512fbdbdcc24a63ff375979e8f80a8c1d030bcebe770ee7be3cd7a6d1efdeecde23b06051b1e275fcb0c717b1108b6d06a7c699f414a891eb16d8b7cce4bc961a3c