Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 20:55
Behavioral task
behavioral1
Sample
9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe
Resource
win7-20240903-en
General
-
Target
9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe
-
Size
510KB
-
MD5
b639bc0a212aee9bc09ae316daff5210
-
SHA1
240e3ec4bc4255de9a585442aebf034a6df69c4c
-
SHA256
9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3
-
SHA512
36f549f9e1a4deb187cbd7e2bab8c16cb31078e2d5a503f8949abf077f4389ce96198d3fbdead95632e5c284c6269625fb2bba87bcaf96f6c1641ff61485ad07
-
SSDEEP
12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKou:3MUv2LAv9AQ1p4dKb
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2512 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1464 irdau.exe 592 moxot.exe -
Loads dropped DLL 2 IoCs
pid Process 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 1464 irdau.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irdau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moxot.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe 592 moxot.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1464 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 30 PID 2160 wrote to memory of 1464 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 30 PID 2160 wrote to memory of 1464 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 30 PID 2160 wrote to memory of 1464 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 30 PID 2160 wrote to memory of 2512 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 31 PID 2160 wrote to memory of 2512 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 31 PID 2160 wrote to memory of 2512 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 31 PID 2160 wrote to memory of 2512 2160 9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe 31 PID 1464 wrote to memory of 592 1464 irdau.exe 34 PID 1464 wrote to memory of 592 1464 irdau.exe 34 PID 1464 wrote to memory of 592 1464 irdau.exe 34 PID 1464 wrote to memory of 592 1464 irdau.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe"C:\Users\Admin\AppData\Local\Temp\9b4b13dbca371f99fe0defc8d6c2370d7513d923061385636b2f344d0e6e07d3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\irdau.exe"C:\Users\Admin\AppData\Local\Temp\irdau.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\moxot.exe"C:\Users\Admin\AppData\Local\Temp\moxot.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5d35772d3dd604dfd49eb86ebaa6f5f1a
SHA1db915609f0889d7aba69169fb5aa71a9c3bda4b5
SHA256f64da20470ab784b9e6e9e5056337861abf5972830b06d518d9d8dc2befe508d
SHA5128c3c6386823a5479fbde39361856153dd2e4baadfc87e95174fdf6d78cf742da7d41521ffcbd736b91ef3046602128900f528dc3bcc86007b6dd6d3ce90aa871
-
Filesize
512B
MD5e153d3bf7fd16075e2ff4f527894c659
SHA11fd5d63b131d13906d3c4ae695e47bdb817d65d5
SHA25644d1e00e7d75e0e13551fd09176d9d83ded33ef992272355befcb1fd72984718
SHA51227db16195dd417ea780efccde2a87f690fdc5b9528641d18b1be1830b486d24de060e299f9786a018b48170d9449e8fc215bd9b32e45e1443e712a35c22041d1
-
Filesize
510KB
MD523d0f1ad4fe4deb342de35d11211ade5
SHA1b05b55e7756c87c71a760cc7f05cb3d420af50b3
SHA25675e701cb6be91e29ce9a9a86ee20ab5cd4b4f6f1d3dd79affa6b33a2b578f836
SHA5120be370d4f1910836b032821d8ca543e55ae75d4fd88c07901ea205c27c1cc91f11406c2ffad713ed24e275ed9bab9022a3f0f23998a2c5c3e343d12726cba587
-
Filesize
172KB
MD50d8ae17584ec813617e1e82d49f2e18a
SHA1f54ed9abb4730d3c464fb05102492291aa172ae9
SHA256a553b7db746fc939cae4909f334aaaa8efb2a5b3e9310458e0c6ae9be41da2a1
SHA51231c39e8b764f36e026d35cbd79ae833af7740a2728ddb0ff24b6eda1d2d7eb4d362257c1c3f62c144e617a7e562df03b64789141eb47f73c21d6b0a355d5aa87