Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 02:06
Static task
static1
Behavioral task
behavioral1
Sample
5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe
Resource
win7-20240903-en
General
-
Target
5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe
-
Size
94KB
-
MD5
a902aed6f605f8095c90b0a944ea6ee5
-
SHA1
d83d3b1b6169ab42b3676ab0bd3ece3608a8b9a3
-
SHA256
5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d
-
SHA512
2067dfd375897841f2202dca2e1b43df9109aca0c7429830479e0f3e91dee96dd232ce286fc97ccbd9f9953c148ed5fec7992287a81ad2ef99c3a7afde992aa0
-
SSDEEP
768:tp0ti4HnnhtwYbJy6rioyelmd1TzulQEDDPOwc5n5uNCT/jhhLBxQIwqepJZU9mG:tWzhtJbUgHoADDIx1hLfuJrG
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2868 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 30 PID 2316 wrote to memory of 2868 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 30 PID 2316 wrote to memory of 2868 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 30 PID 2316 wrote to memory of 2868 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 30 PID 2316 wrote to memory of 2724 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 31 PID 2316 wrote to memory of 2724 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 31 PID 2316 wrote to memory of 2724 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 31 PID 2316 wrote to memory of 2724 2316 5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe"C:\Users\Admin\AppData\Local\Temp\5a662aa053778f05eb91432197fc0331dc0a887bfa4a8bb2d2534cad217d4f8d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD516c2bcf1dae729c5cb36a1875efe354c
SHA1775fbf4b6a2e5bc033b86cfc0893250b5d387a45
SHA256796a881d71234f7fcd9f5220c6e5674e231610bbf37626d9e5b79dc3268b7bb4
SHA512d8bd6cb6cb6ccd3c2cc40edde9cd3e8c09d1ae55c21ac1896325c324c08507e68c16d3864923806d29db79c57b958dac68e43bdcf809c0a2c8b5b0a7b8557177
-
Filesize
338B
MD55aa628668e5a2e652621f00e8902af26
SHA1d411fb03651919743f1f3b1afc264b5ddad02dd3
SHA256e0edd14add836ad29528d0165a95fb2aee78147eacc46d7fd41611e9d8e04a45
SHA5127986227cdef2a9537220aa10605a9b136ecd8db98ede30cd6f90825ad2622ac38e19a5eaacac3230438a3ffe521decf99a63936c4ad8b1704d664bf6d652c668
-
Filesize
94KB
MD5800764ac08afad03e98ef783ed5e1edb
SHA1f23a867f47bab0e94857ed318a7e5c1face2567a
SHA2568429a435f1061b65eb8050f8cc840e528bdf34c41f2cadb9e342370ac03cc8d7
SHA512920fdf7b4573282103612dad2bed6c90d9ed2bd035393a9c99ced04c9c431fdf5b1e753c820bc0d241e95d25b2060c763996c2e764fc9a24ed7cd5c1e3ebe5a7