Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 05:08
Behavioral task
behavioral1
Sample
b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe
Resource
win7-20240903-en
General
-
Target
b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe
-
Size
633KB
-
MD5
bedf5ef24508a60e2459fd9062b4ac36
-
SHA1
3ea78acef799ce1599af184e26611c6f363324b8
-
SHA256
b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24
-
SHA512
d24ca9809f1acbdbbf44f98ebe95b6938ee4c33c3e43ae196cf5c5544d6f88d8e47753e83a062f7c69144adfe39664b88f0c5909edf141c0311b43dfcb77c4ca
-
SSDEEP
12288:5U7M5ijWh0XOW4sEf9OTijWh0XOW4sEfsdd:5UowYcOW4a2YcOW4u
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0004000000004ed7-27.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2428 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1660 acokg.exe 2908 viaxm.exe -
Loads dropped DLL 3 IoCs
pid Process 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 1660 acokg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acokg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language viaxm.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe 2908 viaxm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1660 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 30 PID 2348 wrote to memory of 1660 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 30 PID 2348 wrote to memory of 1660 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 30 PID 2348 wrote to memory of 1660 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 30 PID 2348 wrote to memory of 2428 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 31 PID 2348 wrote to memory of 2428 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 31 PID 2348 wrote to memory of 2428 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 31 PID 2348 wrote to memory of 2428 2348 b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe 31 PID 1660 wrote to memory of 2908 1660 acokg.exe 34 PID 1660 wrote to memory of 2908 1660 acokg.exe 34 PID 1660 wrote to memory of 2908 1660 acokg.exe 34 PID 1660 wrote to memory of 2908 1660 acokg.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe"C:\Users\Admin\AppData\Local\Temp\b05ed627dcb8d0dae63329e1d69491dd49deac708e3f6ca5c41b03d95a308b24.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\acokg.exe"C:\Users\Admin\AppData\Local\Temp\acokg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\viaxm.exe"C:\Users\Admin\AppData\Local\Temp\viaxm.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5dff9241e398129e5231245c4a6cff3e4
SHA19d07e2a8e82bb1965a8496737ec6c78c1dbd32f2
SHA2563b190ce06aaebe8f90da68d6e17f72493426518d3bf63c7c02ea83c00b63e481
SHA51218766b41f461dbd97554426962579b21a7237e6f34507b98a54eb81c1db096523ba43cb51a219f8f45d0c4a637828791c360ce085cb0e30e3030ce678e5b95e1
-
Filesize
512B
MD548b71969a2bd79fb27aa5c27956114f7
SHA1efb6be6eca8484b0c91ca432bf76e1d77932bc67
SHA2564b82146ee14f0f85511545bc03b6e400ae724acb59a28d76933b8097a2ea849d
SHA5124b22142e1f5028147db4cf51cd27db5a1815fb8f690a8fb817531d2546511a14f1c11d29ccb83564410276acedb7441567f59980bc0db4b3301cc46d95ea40ac
-
Filesize
633KB
MD5302f832eaa9ec65b0b0ca6417fcabf9a
SHA1fea14ccd979c9ebb683dafb2b89b7eab8fda8c14
SHA256b04781ac7dad8199b26f85e3e6f992633bc05225c2d7afab7de56235a011e2d6
SHA512f5abc03b7acd37c8ce2f699cdcb41ee8108b241507c6c3cbffc2885646b4405bfc82378e06f1013ed42cdddabd09d685217ec983d2dfa58462b608236877608b
-
Filesize
212KB
MD5d652b3a707740c77725e5ae6b90ca0db
SHA16236b095a5a9f3b7cd9c6e252613292e4526caf1
SHA256fd12d317cb3f237a0f99197f1696bd6af803f17ec93b12e90d922f7cc7ea6024
SHA51280e63622420bbb2ba0ecd1281882f0dac6e6936d9cb88cd1dfb5706c4f52bb1d26780088671899a181c0935dfe3faed1c469c5aa6525d576a7f417d69c8b4fa9