Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe
Resource
win7-20240708-en
General
-
Target
f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe
-
Size
274KB
-
MD5
f7c9a018f5d66e1d592cd9181491e320
-
SHA1
78e1282d9944d4571a5b10514b34439283fab774
-
SHA256
f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839
-
SHA512
9a0dc299c081d1a2ba20ca2f2ac50d17d969c1e30d81d5770f4206465ae2dd146e4a13d46752784d25a7d5d9849a328b4fc2f24d8495ca0361fb8dc0062dc4bc
-
SSDEEP
6144:96xwSR5NtUIJEWyXuew+q1l0d2Js6H5/TZkT:9A3NtUISdPw+Elq2Jsm2T
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0004000000004ed7-37.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2700 puvyo.exe 1332 vizyf.exe -
Loads dropped DLL 3 IoCs
pid Process 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 2700 puvyo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puvyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vizyf.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe 1332 vizyf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2700 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 30 PID 2220 wrote to memory of 2700 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 30 PID 2220 wrote to memory of 2700 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 30 PID 2220 wrote to memory of 2700 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 30 PID 2220 wrote to memory of 2784 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 31 PID 2220 wrote to memory of 2784 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 31 PID 2220 wrote to memory of 2784 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 31 PID 2220 wrote to memory of 2784 2220 f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe 31 PID 2700 wrote to memory of 1332 2700 puvyo.exe 34 PID 2700 wrote to memory of 1332 2700 puvyo.exe 34 PID 2700 wrote to memory of 1332 2700 puvyo.exe 34 PID 2700 wrote to memory of 1332 2700 puvyo.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe"C:\Users\Admin\AppData\Local\Temp\f62afee580a799901cf0a2224ebb969c3898fb383072e9743a9e5cd8bfc2a839N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\puvyo.exe"C:\Users\Admin\AppData\Local\Temp\puvyo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\vizyf.exe"C:\Users\Admin\AppData\Local\Temp\vizyf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD519aad9e281519c7639e609614a7fc59c
SHA12051ad675e5404794c25eb65d989c4372709972e
SHA25666fbc901984b456f25aaf9a511d143789843a7d50a8aaec458f4166f4dc4d00d
SHA5120801f4745c7bfa2cd48189de96766cd945074b5b31dd0b66babbfb4e69bcd78524e3fb94372a5904dd47e703a3fae6f1102784a29ca66bf917a9390a75bfb47d
-
Filesize
512B
MD5682dda94e3cf746ab72494a4883e91af
SHA1b74b9081b62fb6a24e53955a9556ef65cf19c91e
SHA256dba28ec762fc91f799162f7a8768a092ab91fe35d920ca155369d0ecaafe2ac5
SHA512c5e779052acaaa114c7e2bbdb9334c51fc270da4a2701c7abbe96cf6bd33297d2c95b4c0cca950aba6927e95d647cc34ef939a128bd42ef61803f9057f22361c
-
Filesize
274KB
MD5c6f7a28c5756c2a7fef6f51765757bc5
SHA1b6d2df31dd2b01c6746f6012f2e6388b794123fb
SHA256677e01ffaea9fab4de091b1ae00057444dd86338986c86391e6c44d44b4d5128
SHA512069e340b9d03559726a1f847e985c9f4f31f7979059ae02d6f18f24978ec95673ae9c8f92370d10925da2733a4878889e7b7b138ef161aa2cf666e56f8669130
-
Filesize
216KB
MD5197b3a632fbc5070f92d52e2876e64ad
SHA1e24093fbbcfadd7dc8607e1ab69c1f5ae6979ff2
SHA2569b8e8bcc467fd4f243ea9b6f8aeb762bcbab96409d79970d83e30f7435b9d9ef
SHA5121a953ae0f2acc04aaa91690977c8cf77c5f91d2868b5631fae525acdafb0f29b8e58992fb9bf9c9a4f93333b6b7f0eef584b91d4cafd7cfd121d5404dcbd0343