Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 16:02
Static task
static1
Behavioral task
behavioral1
Sample
2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe
Resource
win7-20240708-en
General
-
Target
2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe
-
Size
336KB
-
MD5
ff1817b08ea77c8c294fbf1049f790dc
-
SHA1
f21658cb7f42b850e1fc3e93e439748906c79d43
-
SHA256
2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953
-
SHA512
adad32955a742b788b893237531065dc1ed9b7d74d2e0579f69c6d06910e630d5b161b3728db2d6cdd8d5ec306ca5a713f1d0c1104f5699062b4f5e6529271ef
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcV8:vHW138/iXWlK885rKlGSekcj66cit
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 puadg.exe 836 biuje.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 2716 puadg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puadg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biuje.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe 836 biuje.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2716 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 31 PID 2172 wrote to memory of 2716 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 31 PID 2172 wrote to memory of 2716 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 31 PID 2172 wrote to memory of 2716 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 31 PID 2172 wrote to memory of 2704 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 32 PID 2172 wrote to memory of 2704 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 32 PID 2172 wrote to memory of 2704 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 32 PID 2172 wrote to memory of 2704 2172 2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe 32 PID 2716 wrote to memory of 836 2716 puadg.exe 34 PID 2716 wrote to memory of 836 2716 puadg.exe 34 PID 2716 wrote to memory of 836 2716 puadg.exe 34 PID 2716 wrote to memory of 836 2716 puadg.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe"C:\Users\Admin\AppData\Local\Temp\2151a976443effe5246902c82992355931f4705e5ba32f22e154713484a38953.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\puadg.exe"C:\Users\Admin\AppData\Local\Temp\puadg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\biuje.exe"C:\Users\Admin\AppData\Local\Temp\biuje.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d9b0232951891b7faff98f26ba025c57
SHA110aa402f65ddac3a5009f7c6c55184fd1d3a0a5e
SHA256592d5682515939e91049f2256fbc892e93543a64c19207ebbb6cf2f774c69cd5
SHA51206696c7cc6480da54672b6d9a97d432f73a1dce7a062ba54a5c3f54ced7c743447ee8aeaaa825b97cdba771bc3216f469afd50bcaef1415f2543860fa48efea4
-
Filesize
512B
MD5276f50d8efe8a807d4a4812c0c1f055c
SHA16caee72bca4cecaf2e29f5574a58935652b7c2af
SHA2563ba67f92f349202778d2b4f5d2b61dc5f3ab37d76e7c3a57f1ed58ed30a9c0e4
SHA512365109d361e98d2ac59706ef5903905e65aa00249581a6eca1b669a38f53ba2e585acd4d5f9069a80ef91841e06063eb7527544c349305747f690bdb5dad8bc8
-
Filesize
172KB
MD5949ca45d94899e844879c588773f5e7f
SHA192f1581f587d93c7075add3d7e518dc2a6f7391d
SHA256794fe5464b42b246b57c31f00b70a555ee3f8086317bb036aad1349d08f32cd0
SHA51266db454621281f9dbd37e5966fa411839609f376a1bc1afef1d1718a18d12a03347eb8e6974e603dc1a33d97dc807882c6fdf64bb0dd4b0d9d8bae0523356ac5
-
Filesize
336KB
MD516f3398e811bf410a3b3458caa5f9b63
SHA14bb1eed6bef32594daeaf899e402f2c70e5a721a
SHA256fe1b7b80c0a4e4266f2732752f406bc42569d8a939602f1b1af44fa2e3a52fc1
SHA5120666e4a024513305fff3b539a695efc0d392c1ec45350471ae7f10cf2514cc11a5bf4b5d024c6f462793187d94078d418aad52ee3f609fb6d6bfa5c5db13660d