Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 09:51
Behavioral task
behavioral1
Sample
ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe
Resource
win7-20241010-en
General
-
Target
ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe
-
Size
512KB
-
MD5
ade6d6f7f467d686639210f197f53340
-
SHA1
dde698446fb9a96fa5fdd7dd496d2306c2d8c8a0
-
SHA256
ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81
-
SHA512
7658ab7f82c6080a3c43d185f84b68142765fa1679cb88c3def0dd8fec1b606f2dbdd263dbff78f48465e852bc22fc896ce9df48de8689e9c70976c12cd311e3
-
SSDEEP
12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKo0:3MUv2LAv9AQ1p4dKV
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1196 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2884 unzul.exe 3048 rebuc.exe -
Loads dropped DLL 2 IoCs
pid Process 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 2884 unzul.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unzul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rebuc.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe 3048 rebuc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2884 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 31 PID 2464 wrote to memory of 2884 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 31 PID 2464 wrote to memory of 2884 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 31 PID 2464 wrote to memory of 2884 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 31 PID 2464 wrote to memory of 1196 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 32 PID 2464 wrote to memory of 1196 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 32 PID 2464 wrote to memory of 1196 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 32 PID 2464 wrote to memory of 1196 2464 ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe 32 PID 2884 wrote to memory of 3048 2884 unzul.exe 35 PID 2884 wrote to memory of 3048 2884 unzul.exe 35 PID 2884 wrote to memory of 3048 2884 unzul.exe 35 PID 2884 wrote to memory of 3048 2884 unzul.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe"C:\Users\Admin\AppData\Local\Temp\ece26131038c913431cc219007176d4fe8351fb4c20f78c05e93e4bc71370f81N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\unzul.exe"C:\Users\Admin\AppData\Local\Temp\unzul.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\rebuc.exe"C:\Users\Admin\AppData\Local\Temp\rebuc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD50ae46872747e9bb1c11a1237b624aac0
SHA14516b8b0ce75ea48913a3f113f80b50c47838d2a
SHA2561114839d3fa80c1e35f79c4b5792ef15cad30f66f27e529516adb55b9b7de7a4
SHA512055f99365ed6ff2dd3ae98befce7c337a49bb6fab9816099190c72f566d185df6264aebaf704551bebf0066a68c1453ae9f5334173502ad2e7e06c6208f55f6c
-
Filesize
512B
MD5fa34bbc14bcd3be0af5d913faa6babe0
SHA1cb3706390dd84c9d1ab97050b6e44a8e9ecd864e
SHA256680e3dcd97d4310b84d80741202c5688aca03fab60f3300e4b31d7ee58fb090f
SHA512ae2901859d611ec758b09a2c4ab1449ee06805fcc7e26224c52a9ecdddbc905acda5846481ec53ad0bcca4133c1ce184060d6511c95fb33950377b6fb007859d
-
Filesize
172KB
MD5330da4035b3230ace9937997bd9518ec
SHA1ccf89c53e2cb22d865408d59ae0f1725274c75d9
SHA256c655f4b72e6dfa0c4beab4b921d92e7f6449d9cdb112aac597454f849c83a15e
SHA5126a8c743a96f504e813a4e7e0520918ad1614429f0e636e8d31b6748cbf908673a0b222881d5138bbae2e8d9b328782c2ba28a9043d2f6b0b58322f96cda5aa20
-
Filesize
512KB
MD55eacfdbd98c88250072c4968b99436ef
SHA19e25a7ba706b513047403bf50d6af5d063e452a5
SHA256341316bd2bd29830886d6a1a4db124b9ecf00dd9f4a42a2d1f7d0bb9e5fb5f00
SHA512995ab9e001b657b91caeb40b99489ad5e9b535eb5db5c5e54686bdfa57cfa6a69188275c397a9918d0b5f076f784f86588ce89b6cfd3986241f5bca3dec331a9