Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe
Resource
win7-20241010-en
General
-
Target
47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe
-
Size
341KB
-
MD5
9e6a55c7bce3f2efc330ee91283aaac7
-
SHA1
243ff31193d7d2f618dbe4816e1c6b9a1fbf66b1
-
SHA256
47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f
-
SHA512
746aba37d81f1e00b91fadc38b7e8ea4738f3077ae3e030c611d958fcf90c0527bb6ee704e1881ba6510b1cf4ab8b71e70dcc990edbd6b68bd5e5700eab66fc2
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYpDyZ:vHW138/iXWlK885rKlGSekcj66ciEOZ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2848 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 seecc.exe 1460 ublui.exe -
Loads dropped DLL 2 IoCs
pid Process 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 2804 seecc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seecc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ublui.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe 1460 ublui.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2804 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 30 PID 2876 wrote to memory of 2804 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 30 PID 2876 wrote to memory of 2804 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 30 PID 2876 wrote to memory of 2804 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 30 PID 2876 wrote to memory of 2848 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 31 PID 2876 wrote to memory of 2848 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 31 PID 2876 wrote to memory of 2848 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 31 PID 2876 wrote to memory of 2848 2876 47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe 31 PID 2804 wrote to memory of 1460 2804 seecc.exe 34 PID 2804 wrote to memory of 1460 2804 seecc.exe 34 PID 2804 wrote to memory of 1460 2804 seecc.exe 34 PID 2804 wrote to memory of 1460 2804 seecc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe"C:\Users\Admin\AppData\Local\Temp\47dc53c76c65a8eb881f2f029335253af1c6838cf458ac90eafebfc30561be0f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\seecc.exe"C:\Users\Admin\AppData\Local\Temp\seecc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\ublui.exe"C:\Users\Admin\AppData\Local\Temp\ublui.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD51afa40f14da4e6b164d9537bfc4e11da
SHA1e0527778ccf6699e6f902875ea797f978ff8c423
SHA256aa68e594027da4d021e4310d0a965ccea94d85312deb962a42223e8f784e9271
SHA512146f30b0a11276d32be7638da1a572975830bdcff0ef38ffecdcf8b0ad5d6dbd175a13a30609772df180f2e8811e0598ce46a23c1bdb4c1388ce40f1286a713c
-
Filesize
512B
MD509f786a73ba7875c8ad385825a716e95
SHA1073431f1b0fd398ce97558eb27b8997db75feda6
SHA256f25dd5c5c9f6ad9eb03b85eb2e84be1685968a9a033712f3648e7ebb87f3f921
SHA512eaffe90a1ff46d06bde8de837090aeb6f3f897b54fe13bc5f2412032d032764876be0c09a6e2a76447a7804017b7c64c48b129a7f15983ff5820cccc77cb9d75
-
Filesize
172KB
MD591a1ce3fc2772b50a55572ddca73f3ac
SHA12cd463c4c94214097dad3771971e9925816b010f
SHA256a04d1afd9a3658110b7f6e6c11b06f8bb2e51b7b9e6e6abde6450bca2ff9b0b6
SHA512a2d8e5eadb4a980d50a911c8a17f903d838f264f657c6250d9bdd359a5823e4f657faffbc3dd02973a4a1a9c7bb53e9efa8f8d3fd56b8304003c54386665abb8
-
Filesize
341KB
MD5247a6a5277183b60c2ba75ce9d88ca69
SHA1d786c9b359bf2e38626d707f4835706b0e882e7c
SHA25640770160154285901f9269ad0f74813eb47ed91d933c5a5aac657aaf3cf4009e
SHA5124d250ac792f43ffc96c0bf1fd5b580461d18e6911c6b231b6faaf58efb47ae7ac5a685bd996f2793c6cd447f0629fd358ad9aad3efdc0ecc204523817f176beb