Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 03:56
Static task
static1
Behavioral task
behavioral1
Sample
8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe
Resource
win7-20241010-en
General
-
Target
8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe
-
Size
138KB
-
MD5
cb8e65a5e75981aa5da1ab661821ee88
-
SHA1
e1334456b7bef3ebe043591dccecc0dfb41058f3
-
SHA256
8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178
-
SHA512
a4307b8d867beee1a0502f4bf51e14c97e98e2f36a9811b37c40269735cafac1a23c065a3ac8fa84fd80df4c538fa83a73a4fb91b720fc03961623d6d081d673
-
SSDEEP
3072:VUhMsp+K1OXZjftqRO6DL/qHR4oBvsA7Ipr308dU4GU:VUhAOOt84Rh9KEi2U
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2836 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 30 PID 2492 wrote to memory of 2836 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 30 PID 2492 wrote to memory of 2836 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 30 PID 2492 wrote to memory of 2836 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 30 PID 2492 wrote to memory of 2748 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 31 PID 2492 wrote to memory of 2748 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 31 PID 2492 wrote to memory of 2748 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 31 PID 2492 wrote to memory of 2748 2492 8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe"C:\Users\Admin\AppData\Local\Temp\8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5a2de452e45db47c817b5ada178bd2e83
SHA144b16b5c0e400a2af95299d0c08a6a4fda14bc4c
SHA256516ba3f510ebfd821b47f63ac2c47faa15d5f2ba8732c79c0265fa8aa3ad8fd4
SHA5128799d95d502764a4266c37c1c5fbb24fb9ab94983310962deafd5e246c5900993dffb2c2b06ab6709cc4141aab3346a9cf65b2a62744dbf11c7d381af654be85
-
Filesize
338B
MD5dadb2e56ee33e5be410a837952a72ab5
SHA17cba74617b4c572f23e664f4bd2f4d121e2130f7
SHA256d8a2ba3b4cb071da36cc48a340197eef8706a9c7f20a66cd58d98f221ef6244d
SHA512e5a0f7dc9d1a151b0efdf07026d005aa052101441deb11c60beb2518a39179b2a9986bf507b09b063de09ad2b3e31a4cccd32c6745d589c01726f6cdd731ac65
-
Filesize
138KB
MD540dc93d800238ef9b29780a8f182df1e
SHA1c2623780aa5e7ab170b572966ba544fccbbcd949
SHA256a3244e629f8e695d219731cfd4086dfbb101967591434983a3ab4afa5d2021a0
SHA5127eaf680452fbafafa006d79db98a5d5a1352c20a3dbbc391c89dee1b1d2a895335067d7971024cf0d75409da1c1ebc6a34c6e1b6e8b3a9d5f8cc2a5979907d4d