Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 21:01
Static task
static1
Behavioral task
behavioral1
Sample
200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe
Resource
win7-20241023-en
General
-
Target
200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe
-
Size
59KB
-
MD5
70cd4a5c55eba9390954b36f80804930
-
SHA1
aed798f1974309adccb7a022d5614a835977ee86
-
SHA256
200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42
-
SHA512
ed22cdb09c3e1a6bbd118345fd8d34e0dbe27435b26d74ca16fce6018c8081cd4e73155de0801747caccf17fced8f065ff96cb52cc0819676aeb042911ce8620
-
SSDEEP
768:jb4zb59Yix/RoyH+5flZirYqc97vFvrpaZG3DHvTdA9GgnOuS5Z3WXcKIZx5uDt:jbQx5oPsr2vFxDPhAvzgdWLIZ7yt
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 biudfw.exe -
Loads dropped DLL 1 IoCs
pid Process 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2620 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 30 PID 2344 wrote to memory of 2620 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 30 PID 2344 wrote to memory of 2620 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 30 PID 2344 wrote to memory of 2620 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 30 PID 2344 wrote to memory of 2564 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 31 PID 2344 wrote to memory of 2564 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 31 PID 2344 wrote to memory of 2564 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 31 PID 2344 wrote to memory of 2564 2344 200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe"C:\Users\Admin\AppData\Local\Temp\200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5b6634f9cc959d7ad40df4580e37a8787
SHA100c36e4d006373bfb42314c4ffb1d8452f0ed919
SHA25635cc3250d9744d5c99d7c44d0c62abd85a425cada5fe7a8074d972bc13f17733
SHA5126881cd12b1ddd4d845718ec2052b2c014e557b5ae3671b309e2cb9eea04bb64132989f01880f849e9a7555921d53d34e77b9fd78f993db05bcc7cb5da419599e
-
Filesize
512B
MD5f02bf69ff6351970bce3b50742a769ed
SHA1577db2279b6489628583d770f441f3316ff2a560
SHA256df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0
SHA51242a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979
-
Filesize
340B
MD542d416e7544b1cdd5fcd0ca88f92a145
SHA15e4998fa5e373840fdd6b60cd6311261f576a06f
SHA2561453a9eb20c048bab5c27c3c86623052825243ff7ea90cd35a87ee637a9f23f8
SHA5121c4c884ecf2c40b69c54f0fc78b7b68b4c098e7f7e8f973101a2bd0e631f3f81fcc846cf47ea96e9541baa2ceae87b6df5471afb498e524bfcf7e1a15b03bcdd