Analysis
-
max time kernel
30s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 03:48
Behavioral task
behavioral1
Sample
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
Resource
win7-20240903-en
General
-
Target
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
-
Size
505KB
-
MD5
e8c2d1a78d3f6c19c06a82c8fa661946
-
SHA1
3dac0a7c3a8b17bb26283fe5e0f1f2547dc161c9
-
SHA256
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9
-
SHA512
f572a0740c2c823c3768fe89beebba122ecee8f6c036395908a7b37c2b64885ae1bcc8914e66b3eb97763a779463b3797d12d75eb1f9cfbb3cd6b2d4c8ee7ab9
-
SSDEEP
12288:N/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFO:N/D0caF8wvhb43pDbO
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1628 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 zyxuo.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyxuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2304 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2568 wrote to memory of 2304 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2568 wrote to memory of 2304 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2568 wrote to memory of 2304 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2568 wrote to memory of 1628 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 32 PID 2568 wrote to memory of 1628 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 32 PID 2568 wrote to memory of 1628 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 32 PID 2568 wrote to memory of 1628 2568 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\zyxuo.exe"C:\Users\Admin\AppData\Local\Temp\zyxuo.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5470456365dbdf08d67a707931b70b423
SHA1c1568446d3a6daf6e08ba343e1111b6f8cbd83d8
SHA256f0596ed299657ca0cc56dec4c2a6b056517a5697264f6fb5ae0f2df1f4995610
SHA512eef7c083f488e0161fef9dcd2dbd36821fa29c62407b0a2ceef20beef94dcf00969070314c9118237871075d0b60f43368795402236eb96c48cf3085489dca9c
-
Filesize
512B
MD5c2a463aada7a1780b7a34059651b2a86
SHA1eadfe82fa051aaa53deee771931b52c6ce027ab5
SHA25696478eb8cb7f40732a42767bc790f6e2f6001e2b4a60a9a10cea83af7951d891
SHA51223ac8d2ebad575aaeaddfbaafdbeb462942467aa18da3e70554fa311bb66656605788495328ea92a9db3cbe983c7cd781ade88e75ba8401551bf2cd294c2c1be
-
Filesize
505KB
MD5e9fab0760a20c457f1b7e017915f9590
SHA19c75e14d7a75adc911f55812a96830c9e73ffe57
SHA256071ca89ff65984e5a5e307908848d36e7dbe0e72af6f190f44093c48bec96431
SHA5121a4e89a7c19d3ececb3ee136fbefcf334ddb2826569c05343d1e115233a9759420691b7083abb3664c6b4086f7e45b22e95955eaa20db937c6facfafb5dd98f1