Analysis
-
max time kernel
120s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 04:35
Static task
static1
Behavioral task
behavioral1
Sample
ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe
Resource
win7-20241010-en
General
-
Target
ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe
-
Size
335KB
-
MD5
28b8654544104c69057653f470567020
-
SHA1
75c7d9aaf9238f5ea4a74e8a021380479b3db10f
-
SHA256
ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6
-
SHA512
87c67b343f56522958ba1f539f07ae4b403655f99beccafeb7cf03a6f1b540f18a0ea2941607029468fd1e6e81b2cdf3d63d3103aa25b6225d4fbca5ee7dbbd1
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIrN:vHW138/iXWlK885rKlGSekcj66ciz
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2332 pafuz.exe 2884 geher.exe -
Loads dropped DLL 2 IoCs
pid Process 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 2332 pafuz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pafuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geher.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe 2884 geher.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2332 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 30 PID 1740 wrote to memory of 2332 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 30 PID 1740 wrote to memory of 2332 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 30 PID 1740 wrote to memory of 2332 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 30 PID 1740 wrote to memory of 2312 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 31 PID 1740 wrote to memory of 2312 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 31 PID 1740 wrote to memory of 2312 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 31 PID 1740 wrote to memory of 2312 1740 ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe 31 PID 2332 wrote to memory of 2884 2332 pafuz.exe 34 PID 2332 wrote to memory of 2884 2332 pafuz.exe 34 PID 2332 wrote to memory of 2884 2332 pafuz.exe 34 PID 2332 wrote to memory of 2884 2332 pafuz.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe"C:\Users\Admin\AppData\Local\Temp\ece94b4e16e8b3b5423363d9340018f02d1b2cb837109def6ef2f838d99585c6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\pafuz.exe"C:\Users\Admin\AppData\Local\Temp\pafuz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\geher.exe"C:\Users\Admin\AppData\Local\Temp\geher.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD52ef22e5faadc14ff7a413d15647e3ca2
SHA104b748a9cb6cec12e0a723acad93b47e1e9db424
SHA2565b30fda84897092fb8374c8f9f7af5dced96cea14b2f01725f54d88f159a7d4f
SHA5127b0b17e6ae9b2f41b55cdb4dcd609dfe07128d2c8327448536ac3347f3295146fea26c224e0236954d2fa41841e23636d80390bcf66c43172482b9908b97046e
-
Filesize
512B
MD548ab5f6f7471773d30cc514dc097e4be
SHA1c8e1497e3e4ec7f009171b6315be6f7baac650b3
SHA2560a8ac13b2ca97a7f7fa09a68901792e28c524d92dc8d46cfafef07bd89b79cfd
SHA5126804e6ec9a615a6ba72f88c89b051f327f48faae2f853052ad4b8d68ed3042d60167817e842ebbebd96bfec29664c0e4ccfd336eb6385477fe340b27b6aeb5a7
-
Filesize
172KB
MD5f57deff951d3b35c6e1965711bebf7d3
SHA16047c1eeb3bf71a64d837caf0de8cc860ba11270
SHA2565f017d43785ded9feba67f5f47d5c17603318cadfa32cbca5ba4c337dad81d88
SHA5129e39ab452d83c1f555d22655838f8f1250d5577e9827bd12a32b3215a37d43def85261bb7b0ff88b9a85cc3e9b2060651804b057f5a351217396e2c6d68ea60f
-
Filesize
335KB
MD5090872efb4f4adc2cdd215fbf72938f0
SHA1482ec77ebb634a4d63411b8e4db58d32e072c9e6
SHA256311c5291ec7018f7cc01c68dfa417decc6d7192458baa7b0e6bad838b926aba5
SHA512174f69ab8fb7303f1532cb11097a759773f7c23850d5ce17effbf0ba2d020c9675f1d445db46fcf69e42b9061481052d36f1e848007e1c348ea765d9df073114