Analysis
-
max time kernel
89s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe
Resource
win7-20241010-en
General
-
Target
ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe
-
Size
68KB
-
MD5
facad75e1380f7fc64a615c1ebdd81b0
-
SHA1
0f352ecd5f26961f4328671fcfbef6e657351ca1
-
SHA256
ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855
-
SHA512
90456a3d891a22c844d6775a541890e4179a28008d9522f88b4443f5d3f282709fee557b465b0182f3d93e5e129f428816fa64d5c06c34d1bc613aa0e0c575db
-
SSDEEP
1536:v6fqsAPQYGmPzmZDDZrV8sMQXGkfn33n7z5WeIuhCare9:yLAYUzmdD0sMQl7d7IuhCai9
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 3060 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1628 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1628 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 30 PID 3064 wrote to memory of 1628 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 30 PID 3064 wrote to memory of 1628 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 30 PID 3064 wrote to memory of 1628 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 30 PID 3064 wrote to memory of 3060 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 31 PID 3064 wrote to memory of 3060 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 31 PID 3064 wrote to memory of 3060 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 31 PID 3064 wrote to memory of 3060 3064 ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe"C:\Users\Admin\AppData\Local\Temp\ad8b452c8ba4ae695e8ffd18f460ab8204bffb082cbed03479c39b0affabc855N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD51c9b2720af0ca9528b47898d9c7f4799
SHA180495f16e333f54ecc700252323c2a7cb7d751e1
SHA256d1ea9a17b5a635a121e82e7963d3b134f74050da9debcd40c9622f50c5d38fe5
SHA5125afe876f2cd887458656b1747bce08d03f26ef286bcc83efa93e0111be856d0564bee4d6ef5637c167626bac121f7371b69c7952502d47784ac9ad568bf53eac
-
Filesize
340B
MD546c4e0fc747577949345ae92efb6eb4c
SHA126a9ba9009d4389eb6688e365a80864ea1055f0b
SHA256ccbb1e0c857caa2ebfd4e9f374541cbebb0f8f290546e234a83097252fd77a1d
SHA51208c3f2c62ea277c7e8b9a21af8e20519994e872453062058e84d3d331f116b183a71719e3f5938b4152ef66b8607883ac209e13d7a5bc648d79b8fdca71e0991
-
Filesize
68KB
MD5d9a288d7b746466404193104835924e2
SHA103a5371c6162a54115b65e6fd9fc72f1507ee0e4
SHA2560f392a738941b71712ee83bd086b2e047ae961394f5bdf5ecfd72dcb079a99c4
SHA51254661dd9ae8cc94aecfa2ac1bb4eaedf3eacf8040b892bba14447a0a5881660b005c70349ee4894f66c859d518fe0f9790eeafdde8da75487911b42f6534156e