Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 10:17
Static task
static1
Behavioral task
behavioral1
Sample
cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe
Resource
win7-20241010-en
General
-
Target
cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe
-
Size
289KB
-
MD5
3890385c6cbcf4c554385ee7f4788e10
-
SHA1
d0114d9cc6c87ca277bdc4345a47396330f91b9e
-
SHA256
cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3
-
SHA512
741c66301c41168c203bf88e812fe895690eb5986fae42a92c6a1f263a56d89dc28a28d86674ab0cc9869160e5e625b021fc55ad50c01ef28b542e7c4c1c06b2
-
SSDEEP
6144:96xwSR5NtUIJEWyXuew+q1l0d2Js6H5/TZkKre:9A3NtUISdPw+Elq2Jsm2z
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0004000000004ed7-37.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2188 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2356 gorem.exe 1976 sekey.exe -
Loads dropped DLL 3 IoCs
pid Process 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 2356 gorem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gorem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sekey.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe 1976 sekey.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2356 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 31 PID 3068 wrote to memory of 2356 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 31 PID 3068 wrote to memory of 2356 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 31 PID 3068 wrote to memory of 2356 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 31 PID 3068 wrote to memory of 2188 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 32 PID 3068 wrote to memory of 2188 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 32 PID 3068 wrote to memory of 2188 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 32 PID 3068 wrote to memory of 2188 3068 cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe 32 PID 2356 wrote to memory of 1976 2356 gorem.exe 35 PID 2356 wrote to memory of 1976 2356 gorem.exe 35 PID 2356 wrote to memory of 1976 2356 gorem.exe 35 PID 2356 wrote to memory of 1976 2356 gorem.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe"C:\Users\Admin\AppData\Local\Temp\cc1086ee187d56dfb4a99abcca30ab8582353309dc3701ef00ae01356d20f0b3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\gorem.exe"C:\Users\Admin\AppData\Local\Temp\gorem.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\sekey.exe"C:\Users\Admin\AppData\Local\Temp\sekey.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD508f387163a951b72caaeef7006db75d8
SHA13905f476885ffdad41f4251d61bb0ba7650fe584
SHA256ecfb3c279372b918017ac7b6e782c428d8c21a4cd86b0e6d54a34784b990261e
SHA5125701a67f4785769e4717ac285dde64ea8e53ae50a1455bbf37a98c89687703074c5e7caadbc19a44241e496a2799f00d239ab60bf9141e12acdc6ebfe3d16815
-
Filesize
512B
MD5a85167dc90016befeabec8537288adcd
SHA1596486b9b00a88c6e0251a99e469a2ff403837f3
SHA2569ef69f51960365c6c3cacc0e5583188daea5ef99548255e2afb41f7a0ed6b01e
SHA5124fa818a253cb0ead64ac1df2d67dffa55cb1a390d06afcae38ce2bde2a936a9d8033a45d7db53ff16d8894888e4210f6a0e67fb8ec32b2330183032be9a7ead2
-
Filesize
289KB
MD532041d13a60ee7be36ea95bf120b91c8
SHA13e048db526d9382446b91ef982b12a0de1438abb
SHA25624fe9bd430e82e28c718e62c1f281bf20884ef9ea3d0dc15cd6a90e876501ad5
SHA5124969c7299f6bd891f6abff7510b0f005a6469a325d4a07de5553ab7d583adfd2a05f6d321772eaa8e937890eb8761e660d488378dd05a924f5fc659425e8bc7e
-
Filesize
216KB
MD55d5877874aba13f93d914fc5b55b39ce
SHA1f66e4c7388601a0cd6e71e80622e3511d893aee8
SHA25641a714c14c9d0f688c183a28a339bf173aae91f180700772e351f0748c379cb3
SHA5122441232381b97a2df69686cf88f1fe4c13635e327c382cf0c6d5f5ab49ba813aa3779fb3832f7e26a4f66dc1e89f84a495f2ee2ad403706507f809927a96aa98