Analysis
-
max time kernel
119s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe
Resource
win7-20240903-en
General
-
Target
4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe
-
Size
335KB
-
MD5
656c52672acd38b367c7e81c9523160e
-
SHA1
aeec37f8fb38a07b7e9cb06fd99d7b0f0ca40863
-
SHA256
4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1
-
SHA512
bd07a8019ef70e6a8e05f495abb04341cf5f887e7148d1e8ad0128671684e157f0850e0edcde1ef24a98234c2d19f884a1aefa2bfa73010c528a5d11ef2d7d2f
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYy:vHW138/iXWlK885rKlGSekcj66ciD
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2376 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2312 wuqeg.exe 1380 helov.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 2312 wuqeg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language helov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuqeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe 1380 helov.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2312 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 28 PID 2868 wrote to memory of 2312 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 28 PID 2868 wrote to memory of 2312 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 28 PID 2868 wrote to memory of 2312 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 28 PID 2868 wrote to memory of 2376 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 29 PID 2868 wrote to memory of 2376 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 29 PID 2868 wrote to memory of 2376 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 29 PID 2868 wrote to memory of 2376 2868 4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe 29 PID 2312 wrote to memory of 1380 2312 wuqeg.exe 33 PID 2312 wrote to memory of 1380 2312 wuqeg.exe 33 PID 2312 wrote to memory of 1380 2312 wuqeg.exe 33 PID 2312 wrote to memory of 1380 2312 wuqeg.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe"C:\Users\Admin\AppData\Local\Temp\4cf7b941b444e78dc4bf2ec2e8fc9fdf7e165a80a718be8d4bad1510dafe4bf1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\wuqeg.exe"C:\Users\Admin\AppData\Local\Temp\wuqeg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\helov.exe"C:\Users\Admin\AppData\Local\Temp\helov.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5e3aef9da755fc2c331152df0a7f489da
SHA198b36755e9ef9e55ab9fa332777aaa4de09b487f
SHA256ed4248cfb3200367bb9da58dda79fe97861dae2a6548acf1b5a921719c9fc005
SHA512f228d6eb815b07c67452d7575118e1b2f105dc74fd4ec3523fd1be5660c2356d36abc5002612fa671901156d39c832d3c0f5b109c8f6636e8d6ad59113d06ffe
-
Filesize
512B
MD5e813ad94baefe35743816eee6b0e6f09
SHA13d225f1620b5bf5071897ef6246704eb4a35cf7a
SHA256a26838ad24e50b5487d6dee17829534bfce999f6d3c9b4e55360f39e5dd9c146
SHA512003f52287644a6c3e1e5859a85b891ed1b01865441cd3e8178418b4070d3893466ac19f96c0cc8a18acca2edb5e5b054a8cc93a8f3819523eed4dc95832105da
-
Filesize
172KB
MD50f0bd3de2c7f3f6cd0d0e8757908c488
SHA1671794d47dd56aa73ea7daed12602cfd6162f7b3
SHA256dadd1529edfbec7e395063ce0a7e7de91163b59a54a96cc108f8cc2dd5d74890
SHA512caa8abc93f61a17b9c6b703e2678805dd179553ad66978df7aeb1d24e201e7091bf4593e25e7cdf52b408d7bddfec51d0ad9d706267f7e40f1fbb15c7e550f13
-
Filesize
335KB
MD515b04fe99bc4f4b985b71367bde7a77b
SHA124940c728ab1480ab6348d6d8a4a99d1bb3d048d
SHA256f1a89ad7121769cc9077aae2a470bd814da5fd989a34b3faff18cb5b9b2d49a1
SHA5126011f41c2bbde77f4a00afa6f8a0f99c9e4cecfa5cf497fb3cd095172ff0af5a4d5dd6025e505221c9e3da2034ee89d45d42984416c29965f4b89b3ad4d25218