Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 06:15
Static task
static1
Behavioral task
behavioral1
Sample
653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe
Resource
win7-20240729-en
General
-
Target
653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe
-
Size
93KB
-
MD5
9ad3c3f8b3ea9acc79311422bb59d2da
-
SHA1
97f19c8de3bae716769a8c5a4943df974b578b6d
-
SHA256
653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce
-
SHA512
08fa0bb96d4e0bec84704b557323d19bd49db12aadf522c63ad2d5e2d8f5f94bd5ea248ad8fd36c2485892f535fdb8bb64b05168426953eaff8a35ce7e07f1d0
-
SSDEEP
1536:iDJj/L6UWX/iDdolO4g033dsA2+n1qn1iLdB6XC:iDJj29G4gItR7n1qn4LdoC
Malware Config
Extracted
urelas
218.54.47.77
218.54.47.74
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2760 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 30 PID 3052 wrote to memory of 2760 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 30 PID 3052 wrote to memory of 2760 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 30 PID 3052 wrote to memory of 2760 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 30 PID 3052 wrote to memory of 2672 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 31 PID 3052 wrote to memory of 2672 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 31 PID 3052 wrote to memory of 2672 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 31 PID 3052 wrote to memory of 2672 3052 653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe"C:\Users\Admin\AppData\Local\Temp\653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5bd60c62717a862c75bbe8c97f365be39
SHA1bf0957b47d8a44f51f9e9680c4e06710edc91b1b
SHA25640afdaa0bdbd385e5c0f0c0899eb8dc107877ab9d815d7b8885bd4c3f1e34873
SHA5128d2fc5df78c3badb96ec1c1126366c25a235f9487b7a6754abf9d9b47ece7a70a187b45ada732aa14f63f1f9520b01432f0ba1b752775e26fe8b892848a01825
-
Filesize
338B
MD52f02154156e741e52ed4f4d309714011
SHA1b1b17f1772547bc5f49455957124ce96036fa881
SHA256ea31404127be0a9327592deb9b3d8b4046c2717556cd5b990be269b80396bf9c
SHA51278e774e931c10c5ed9d186451aef178e53fbcc58116c9d68d79b879e92737b4be964b35ac180eb6a2694eec9d24687e1b72f6a4f1fa96f97ea117d0f389f902c
-
Filesize
93KB
MD580d63de464dab72a637f700fc4a1ad6d
SHA1656a02ea30c71c8ed26f09da9d41bff550626ba4
SHA256913d2455c4e61cf65ad413447b86913fc861e7a3ca1bc737102bbf0d5ab38ef7
SHA5127ed4f8b304d9b6e0b4127ba0f993183a7f3688109bd3515c08caf4155055f14ea8592db21f35389fcd9a87c0f94e1d6473d23dc114b8c633ba1798054ff0b3a0