Analysis
-
max time kernel
119s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe
Resource
win7-20240903-en
General
-
Target
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe
-
Size
6.5MB
-
MD5
b02b00a0296a4ef74579e2c7b9c97de5
-
SHA1
efb2b78bf3c740b8e959ccb119e69016289c6209
-
SHA256
2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0
-
SHA512
462343769bf21260b34a27dbb8151c25623dd181f78cd845d7258f2da135d38b1a019ebd34e45842c9449ac003984ca64902d69baf78e8234c7b0f19713115d7
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSi:i0LrA2kHKQHNk3og9unipQyOaOi
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2808 dosut.exe 2108 kaqecu.exe 3048 vozew.exe -
Loads dropped DLL 5 IoCs
pid Process 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 2808 dosut.exe 2808 dosut.exe 2108 kaqecu.exe -
resource yara_rule behavioral1/files/0x0008000000016da7-156.dat upx behavioral1/memory/2108-158-0x0000000004800000-0x0000000004999000-memory.dmp upx behavioral1/memory/3048-162-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/3048-174-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dosut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaqecu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vozew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 2808 dosut.exe 2108 kaqecu.exe 3048 vozew.exe 3048 vozew.exe 3048 vozew.exe 3048 vozew.exe 3048 vozew.exe 3048 vozew.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2808 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 30 PID 2860 wrote to memory of 2808 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 30 PID 2860 wrote to memory of 2808 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 30 PID 2860 wrote to memory of 2808 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 30 PID 2860 wrote to memory of 2944 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 31 PID 2860 wrote to memory of 2944 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 31 PID 2860 wrote to memory of 2944 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 31 PID 2860 wrote to memory of 2944 2860 2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe 31 PID 2808 wrote to memory of 2108 2808 dosut.exe 33 PID 2808 wrote to memory of 2108 2808 dosut.exe 33 PID 2808 wrote to memory of 2108 2808 dosut.exe 33 PID 2808 wrote to memory of 2108 2808 dosut.exe 33 PID 2108 wrote to memory of 3048 2108 kaqecu.exe 35 PID 2108 wrote to memory of 3048 2108 kaqecu.exe 35 PID 2108 wrote to memory of 3048 2108 kaqecu.exe 35 PID 2108 wrote to memory of 3048 2108 kaqecu.exe 35 PID 2108 wrote to memory of 1700 2108 kaqecu.exe 36 PID 2108 wrote to memory of 1700 2108 kaqecu.exe 36 PID 2108 wrote to memory of 1700 2108 kaqecu.exe 36 PID 2108 wrote to memory of 1700 2108 kaqecu.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe"C:\Users\Admin\AppData\Local\Temp\2bdcba71006b2955fece1f73cf42078446825deabc1a7758109ac724401728c0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\dosut.exe"C:\Users\Admin\AppData\Local\Temp\dosut.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\kaqecu.exe"C:\Users\Admin\AppData\Local\Temp\kaqecu.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\vozew.exe"C:\Users\Admin\AppData\Local\Temp\vozew.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1700
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD51f8bb15b7e8e230fa8462286d3038139
SHA1417de0d18959888cd88876e8602d489f1aced27a
SHA256901b449c197c62e52984d29c9ca843255be9c775c9b5acc8831dafa98bea9c6d
SHA5124a54f1aba15314b6cf962a1ca61365304368c85024477f9a48f2a7b011195c14fadd663724edaa2bed044feccc35c92cc2787a5e3a6a5817e35ae269061b7635
-
Filesize
340B
MD5a4c3ec95e0a3ea35f1f5e1606b39f74a
SHA18433ce2f9a01ca5065e35d4029e69a04751df69c
SHA256b43823c0cc0568580d4c88db72a3252872a609446b0d4d2a5c9e48d587de3250
SHA512523f6e191417f267369f863539cf7bcbbc6d277508cd9fbc47a00891ada3934dbb8ad049b8fffd03b83c9846e60492450648d024f91acbbb30dcfc4174f309db
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD5812a382a5281df98c70e7f3d1c7b67d1
SHA1a7ea7e16198692b09c757fce8eab1045e0416927
SHA256dc80ba5e67f363a19b319e7e88ac2da994b0b5b2c284a43b8b602e7e7643695a
SHA51239b060b260343ba8c266aa4d8ded7e8a9e689c3fa0c0b65497dd1298a5161f204da84df0b15edc44c1117147348092f3bf52ed9ccd5adc51725b3e3c89d46086
-
Filesize
6.5MB
MD5f2d6c8d18e2b79e6eda80189f871e888
SHA125832ebee8be642fcd953c3c3a5ba3665ef55237
SHA25663bf095f8b65200794f53d35ef7f3ce9a2c3e12fda1c7c8f576062924411eadf
SHA51268bc82f418a634d19d38300fb3f019df2ea7943eff2a9adfdf8aa88e9d502d574b2bbc06691e08190d300f214eb99dd134677d4f7a9671111e83f62d624a669a
-
Filesize
459KB
MD5926681e255e3fffe41233a0fd17bb2e1
SHA11a71f872b718fcb148579f276294a2671c374287
SHA2565e6f3edaccb604e66e4fc8e43c50d2fe5d3f774458ec2c0789be708333b39e1e
SHA51292602fda57f88a227bc5963b41152bb657979b6a0854a158fcda92940698081ca1d532b0b4e7094021fdf0cd05d7eecff18ab7999578c708c97820b1e3d0d5b7