Analysis
-
max time kernel
120s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe
Resource
win7-20240903-en
General
-
Target
ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe
-
Size
341KB
-
MD5
09b5ac695ecb26f5923167783af898a9
-
SHA1
f78da648815348fd48e1ff6c1ceedae215517e1e
-
SHA256
ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248
-
SHA512
0d71c6709e2ec28c5f9b04efefb618f63ec551c2693c5f90cee9658495a46471ae83dc0ae7a2dc63ea0ca036d8cd2dc02aa7df9f05d944e0300de9ad592a1f14
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYRcECHUI:vHW138/iXWlK885rKlGSekcj66ciaC0I
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2328 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2524 leqep.exe 1348 zyqur.exe -
Loads dropped DLL 2 IoCs
pid Process 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 2524 leqep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leqep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyqur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe 1348 zyqur.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2524 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 30 PID 3056 wrote to memory of 2524 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 30 PID 3056 wrote to memory of 2524 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 30 PID 3056 wrote to memory of 2524 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 30 PID 3056 wrote to memory of 2328 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 31 PID 3056 wrote to memory of 2328 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 31 PID 3056 wrote to memory of 2328 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 31 PID 3056 wrote to memory of 2328 3056 ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe 31 PID 2524 wrote to memory of 1348 2524 leqep.exe 34 PID 2524 wrote to memory of 1348 2524 leqep.exe 34 PID 2524 wrote to memory of 1348 2524 leqep.exe 34 PID 2524 wrote to memory of 1348 2524 leqep.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe"C:\Users\Admin\AppData\Local\Temp\ca8f7a3df2b8247a527e4c560eb897c746e63d0cb413753e5c0759c0a746c248.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\leqep.exe"C:\Users\Admin\AppData\Local\Temp\leqep.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\zyqur.exe"C:\Users\Admin\AppData\Local\Temp\zyqur.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b7f738828e7994f6100e64d268f74324
SHA1eb8d5fb479fc449fed54c2a3f3442ca1eb09e30b
SHA256c55069323b429916772859606722ad8928ea6ed8a005a649589bed8f7fffd5bf
SHA5128b1a8e647a6f14ed1cdb403b0eb29659a83fb2928740c373851f37e0fa41fe8ebdf9a313bf98d910fe43f369c806328e88132b9c10cf0199b66e7443d63a0cf3
-
Filesize
512B
MD57ae16f7e545a1f3d278097d18ac6af4c
SHA1c8867aa4b4d83b3f6dd1dd3265894a7645187b75
SHA25685ddef02d3d77c5192b747a94b7ced6f79bd20bd6997e9fbe25fd09301319e35
SHA512a4bf9fe89a67d895ec1f51a2d809fafe15572cf755f11f07e9d55c7532c9b0f8a39eb91b8162985de5aaf1a0996f4bc0ad8f4a257d1a3c8260143e1cde86d5ce
-
Filesize
341KB
MD5fbbf4e190684f111bfd358ba44b02302
SHA1f7e70168b01a37ae810f038983a5afcc79f8ec1a
SHA25626cc9a5a0aa372cf6c033b9793cfaa182c2481d1de29bce0a383ea19b1ca36c9
SHA5124c5179d8acb7551f7ae786364beee2044beee4d869863559de9edd2df80afe950a9d44111313078a11faf9fbe7d80756ac45a213897db77a00326949a240691a
-
Filesize
172KB
MD5b7e67b6cead8256e7b1bdf34ee7e2eeb
SHA117ecc89e33dcc8baaf7c5bf400f6c66158cbe7eb
SHA256d3b80dc6e60c645c6decb60ecbeeebe614410017e4dc4cafd604e762701e926f
SHA512601d2807efedc157de98bb3971323c38a1aed8c2ad99a6143c8a4316d3a9d719459bf2cf4fe73a0e5b50847dc5ea7ea01eb0585c11caf22f711c476af55988c6