Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe
Resource
win7-20240903-en
General
-
Target
a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe
-
Size
335KB
-
MD5
04d68eaf478d47657476caf43d7285c0
-
SHA1
ce15233f41f268c12fb404dee0fd43278a8ea1a7
-
SHA256
a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5
-
SHA512
1ad03af4af901ca022b64a9d2e630219fc546afa72ee3ab978413b7cdb1c0cc651074b28bac870b1ba27e3b883e3d64524e33d63727403fdaabf090d500543e5
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYi:vHW138/iXWlK885rKlGSekcj66cir
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3060 kyseb.exe 1628 pizie.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 3060 kyseb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kyseb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pizie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe 1628 pizie.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3060 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 28 PID 2080 wrote to memory of 3060 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 28 PID 2080 wrote to memory of 3060 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 28 PID 2080 wrote to memory of 3060 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 28 PID 2080 wrote to memory of 2616 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 29 PID 2080 wrote to memory of 2616 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 29 PID 2080 wrote to memory of 2616 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 29 PID 2080 wrote to memory of 2616 2080 a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe 29 PID 3060 wrote to memory of 1628 3060 kyseb.exe 33 PID 3060 wrote to memory of 1628 3060 kyseb.exe 33 PID 3060 wrote to memory of 1628 3060 kyseb.exe 33 PID 3060 wrote to memory of 1628 3060 kyseb.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe"C:\Users\Admin\AppData\Local\Temp\a450e5582c57fd586cff18525cb71193d17786f64ae3850df33967c805eabae5N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\kyseb.exe"C:\Users\Admin\AppData\Local\Temp\kyseb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\pizie.exe"C:\Users\Admin\AppData\Local\Temp\pizie.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5c172a424cc00b26d4d85581ae514e7d8
SHA1a7ecdb5ec063dac988c82b20d1f0a86b92614006
SHA2565b527a29c060d697eec47886c68afd011769d9228bdd88908fe3830785e07fe3
SHA512d84c0f57c681eea26dee174c9a60bbe3f7a1442ac30ce38b05e57fc9e4b94c44f208eaa2112f913be04cce8459aeb959a4990b3c002ad09803e8fb80fab5b12b
-
Filesize
512B
MD5d64632faac143ebc477f72d53d5ff345
SHA1d4319b207caee0f2bbddaf34f9fafb0734a8ceec
SHA25657effa4e2b1c8ea623219efdd437f4488a9e06d8714ef939745c908433a02fe9
SHA5127de744c84bba1023b126b6d2c67ed8fbede4ef1c98e45384561a3c034641b16a39173a97765a633109d1748a60be0e6e5b6c7eb8f3b93d4a39ef461614ed49fe
-
Filesize
335KB
MD55cc9ada4e2fd08a73aadf90f232ec133
SHA14ddc417b4d5b24975b512f213dc907292df9106b
SHA2569490cce45b85b0ed5c45192b19307c4ee1e02ac55d7b72fc221b47cda75fe443
SHA5123d41d194ad7fd223247f3bd3e268f0d5b094f320fae02ac75af346cd6a8f8dbc02583638f4433ee8b64ab34228d00677ddbdeaead8d0e4fbfbf2410bafce8a0d
-
Filesize
172KB
MD5a41c0e50e2df96e681a7cb6d881395ea
SHA1cbdca18db3b9e75a318e028b9d7d3375d590d4eb
SHA256ea523b6b39305cebb64ecc81be4edaa458b5065e5a4618bfbd82eed000d83005
SHA5122259e9cf73fd58ebd8de8a7faf2af3eb1a9e9e245a8fe82d890746948ffed032c71869af5641a01dd216a492600ffc5776007437ca83037e1b66174fa5292e1b
-
Filesize
335KB
MD5770c2582e75ed490ff3c9887a2a3caad
SHA1fd3e6c90664c74e009de8152a496582da748c743
SHA256af9f85844b0d610ae3956dc9e3f7e61d225083f766e7ac6ce8a5d2241b281446
SHA5127d047840e06a68010ead45c0b586c1f33b5529dbfad73adb3d8540c54973eb294dad24e92a56e1bf90a9ab639c61926802569e713deb5d8a8c8895e5e449725a