Analysis
-
max time kernel
89s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe
Resource
win7-20240903-en
General
-
Target
5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe
-
Size
94KB
-
MD5
ac2b568e1dbf238ea91ee2bdd46db1d0
-
SHA1
93f75123f3b5b7ff62805b88ffa11b6b932fb120
-
SHA256
5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1e
-
SHA512
2b47a240eabdd7a9806e1531f0a09cb96498237930b7e36fc939769b445621e3afc6f09c766b3ea7c347cfe3c859506a2f97129461e854d5b70a5b0e3f79742c
-
SSDEEP
1536:nwhq8V9IpPf2lgiIJ4pivJnuNVueC39GdBR3M9co:nqV9MziU4piRun7C3CP3MT
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.209
112.175.88.207
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1312 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1044 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1044 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 28 PID 1032 wrote to memory of 1044 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 28 PID 1032 wrote to memory of 1044 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 28 PID 1032 wrote to memory of 1044 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 28 PID 1032 wrote to memory of 1312 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 29 PID 1032 wrote to memory of 1312 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 29 PID 1032 wrote to memory of 1312 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 29 PID 1032 wrote to memory of 1312 1032 5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe"C:\Users\Admin\AppData\Local\Temp\5b07e78224332d18a4dd62abcf09213edbab86467be494abe3aa571857eb2d1eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD502167b944a214fee3d34f9a7e356dc6a
SHA1ca5b3f38a7151268726401593eb35f9b67bdde97
SHA25677fcdadc9ba56daa81edb3f0ef876e38a8c7de56187c28c7d02992cd9e0a243d
SHA512c8976c66724d737105a66699673052d7bc7f1e1941c91e03f97452aaba714d35b1d55434e950b00c58626b8bcf16186a731cccc503b7ba08f080ead3eaca5817
-
Filesize
340B
MD523ad5ac14795ef275611fbdc70531902
SHA1ac1b8166966cab38ce0f688d2c458d42ce665ca4
SHA25644ef568f70b3bc36752338dcdb299d7226c1524e7aacc12653256fce0e9342a3
SHA512c28359da8c5c7674bd3be3f201064b9164ecf0a522a6e17a5b7eff0611728367e13171d9e1e9529c94b0cbd9f240672c98283dd5788450289a5db6452a1428d6
-
Filesize
94KB
MD534aeb262ff1e04894f5aab8041a2b754
SHA17183bf4507e92566a2b01884fd300a060ca00e16
SHA25642dcc9177fe94b7e943f8f2dee5eb164a34d53c2335b6af332a52a7bb76e250a
SHA5126741869358974e3785d96ff32011e69a6270b84061990756ed55eeec893a35d38562ad75b24a6781065104325d3c8c383a9aa427d667bc51ea531f4797d54373