Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 18:51
Behavioral task
behavioral1
Sample
511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe
Resource
win7-20240903-en
General
-
Target
511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe
-
Size
508KB
-
MD5
eb48477271572c6589faed3de0a22420
-
SHA1
ad4fe8092ab79c942e4f55c82dc160bb95885258
-
SHA256
511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9ed
-
SHA512
74f037cb5f2174f478adcdde225b1f9fa66d2477ef99c79cee66bbb3abcbcff5be80b4f38e7f9c0c881978da74bf1814331494636319b31cdb5f07e9f8f1661f
-
SSDEEP
12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKop:3MUv2LAv9AQ1p4dKY
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2948 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2308 lywuk.exe 2788 cisuc.exe -
Loads dropped DLL 2 IoCs
pid Process 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 2308 lywuk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lywuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cisuc.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe 2788 cisuc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2308 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 30 PID 3000 wrote to memory of 2308 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 30 PID 3000 wrote to memory of 2308 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 30 PID 3000 wrote to memory of 2308 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 30 PID 3000 wrote to memory of 2948 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 31 PID 3000 wrote to memory of 2948 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 31 PID 3000 wrote to memory of 2948 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 31 PID 3000 wrote to memory of 2948 3000 511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe 31 PID 2308 wrote to memory of 2788 2308 lywuk.exe 34 PID 2308 wrote to memory of 2788 2308 lywuk.exe 34 PID 2308 wrote to memory of 2788 2308 lywuk.exe 34 PID 2308 wrote to memory of 2788 2308 lywuk.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe"C:\Users\Admin\AppData\Local\Temp\511e7048c26382693bc5949169e611c67e51687088fcd383453ca5586dc9f9edN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\lywuk.exe"C:\Users\Admin\AppData\Local\Temp\lywuk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\cisuc.exe"C:\Users\Admin\AppData\Local\Temp\cisuc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD547bf8eb2e74fc36b06ac669ef243a886
SHA1852f333eab64749106ffcecb52d764ddccf455c1
SHA256190af1c1580486206366aa42f93623b91e71b5b21a48dffb88fabbe9b3e9e270
SHA51273c096e9c503837b3c09f26cd0abf7ef14aa276a758684a8df71cfac4739a28233d5c62577fe10ea839eab1d712f4c84a7ecbadbb74d0f8dfc7de3d857097e8e
-
Filesize
512B
MD5f959f67f2222b0f10d43426f3e0a23f0
SHA13246bec677ddfacbcc3fd083be0de5aded3fde2a
SHA256112e48960801c88d201cd8dc922ecb199c41bdbdbae1b16309e86a3c24326b81
SHA512465cea7a2f2110a777b6a48d587336495b91ae42e8ce29ef480c6f4bef8c5c347c9bbe1323a19d7dee84d05a4f505aad68b48a08e98716edfefe02e51f164f40
-
Filesize
172KB
MD59ce5821a8ab0e442f38f2231db918c20
SHA152be702c14ed1d0936d40aa63aa926df0189e9b0
SHA25619e825e2ee17dc3441cb084d4e411c9c263fe96ac1bd6cbf6c81cffdad62a622
SHA5123edac71c2b5a34abce827a24bf05796eeb1b3f3f9c972bd8ecdda224b34f5dcfbfb413f0d2bc2d7fc431ceaec76d82fa9d4aeb8d821f08873d3782f9d6e2646f
-
Filesize
508KB
MD5d42355792fc618e052b5e6bd0860dfcf
SHA11edeb2feb377306cf33e80151a0568cb5629fca3
SHA256a25f859d6fc20e66360e0e0279ea9f9fb85098acebfc28443eb7412c32f7a7f2
SHA512973ab58ebe26ecef0f86f53c2edd400087018132e154c68be98195e44733d4bfa39faac8ae40199f0bcd2d16ddbaaac5645706f14df02e7099d5fa227b786171