Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe
Resource
win7-20240708-en
General
-
Target
9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe
-
Size
290KB
-
MD5
b1c6e6432ed4e567ad172e3bca531b80
-
SHA1
3d851436b46036ebd5c5cc094dc4d910c1ddff38
-
SHA256
9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1de
-
SHA512
95e5aed3a67352d35cc4a270bd5f94a1aa49996796160d5ad425028d064b38e85755d46515560aead79c0e3ab8c0ef46269cf6109062d0c735a651b6190561bb
-
SSDEEP
6144:kN43gKpDPeVvnAmZ64XMxvQ4x1OpGcm9VQl0lM/oJ4/gupw:Y4npK2y8zzkGHVqoq/gL
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1904 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1216 coisx.exe 2088 mujea.exe -
Loads dropped DLL 3 IoCs
pid Process 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 1216 coisx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coisx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mujea.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe 2088 mujea.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe Token: SeIncBasePriorityPrivilege 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe Token: 33 1216 coisx.exe Token: SeIncBasePriorityPrivilege 1216 coisx.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1216 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 30 PID 1680 wrote to memory of 1216 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 30 PID 1680 wrote to memory of 1216 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 30 PID 1680 wrote to memory of 1216 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 30 PID 1680 wrote to memory of 1904 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 31 PID 1680 wrote to memory of 1904 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 31 PID 1680 wrote to memory of 1904 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 31 PID 1680 wrote to memory of 1904 1680 9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe 31 PID 1216 wrote to memory of 2088 1216 coisx.exe 34 PID 1216 wrote to memory of 2088 1216 coisx.exe 34 PID 1216 wrote to memory of 2088 1216 coisx.exe 34 PID 1216 wrote to memory of 2088 1216 coisx.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe"C:\Users\Admin\AppData\Local\Temp\9017e591dc02f900a3a792c66dc2ba81bcbff66556db76a5f9de837e42e3c1deN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\coisx.exe"C:\Users\Admin\AppData\Local\Temp\coisx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\mujea.exe"C:\Users\Admin\AppData\Local\Temp\mujea.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD585cf157bf270207d916c41083f7d049a
SHA1b769fc93a7c2507e85a05b98274ae289a2be6f6c
SHA2568586db8e45a3e53125f6cf2f98009cc2a96fa3113c2d1351d873bc7d5f9c6de7
SHA512c330076c8e35bf1627bc3ec894d0f6a3daf345c15ad7519dcef6e1501423b7166b0d6b0f988ccba894c9154a032a41fc425fa4fe79719e9875308fed294541e0
-
Filesize
512B
MD5deca72cc995877b61750acdc045673c3
SHA1b62d08b9ae609cb3f57cf298cd5b8a82a761f127
SHA256dfd7043156ca22cc997bc6276c884129e8a9f6bffc2b0aef0dce1390e1ba3ee0
SHA5127084d1dc7c57add139166b4d72672cc67a8b84e6a5b544c20f9d2dcd4e5c0d01ab82da6f40c8cf74380507b7fba75dd6d0ae3806db6e786fee80e8a023fca8fa
-
Filesize
290KB
MD57e10a582e3643ccc54ca35e1b4b73d75
SHA15ecfc91c9007746ad7c326c9c73c53381c21882c
SHA256b02f04f5ff166893a2692560ab66cd52063b1fe0d44f8c407d15bf8abb2e8b93
SHA51250585ce9c7104072ccf58eb7e7f908cf9fed0349c3dde7fb478f7191999c4ddcf1d86175c47db09ad4d880fce74845991430eacf7f83e21d811bb838e35d9c48
-
Filesize
203KB
MD5118d3c888a0c0cd18d427edd3eef584b
SHA15c4a768fab1dee57310d36dacbdead2536d9fc9f
SHA256d322f47580a637d8b4a2175337789dabd2a117e87a2a8e373998eb40006bcd3f
SHA5124b7a134250e2da15f20e8e12bc1c45d46627cfe4f161d8aa8de45ef0d180bfd11e3c7ae983984d1cc0a6d6abd4578d7d03ba185fdffc63841ef64101b5efbc73