Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 03:48
Behavioral task
behavioral1
Sample
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
Resource
win7-20240903-en
General
-
Target
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
-
Size
505KB
-
MD5
e8c2d1a78d3f6c19c06a82c8fa661946
-
SHA1
3dac0a7c3a8b17bb26283fe5e0f1f2547dc161c9
-
SHA256
bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9
-
SHA512
f572a0740c2c823c3768fe89beebba122ecee8f6c036395908a7b37c2b64885ae1bcc8914e66b3eb97763a779463b3797d12d75eb1f9cfbb3cd6b2d4c8ee7ab9
-
SSDEEP
12288:N/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFO:N/D0caF8wvhb43pDbO
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 3012 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2092 dofit.exe 2932 ewsew.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 2092 dofit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dofit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewsew.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe 2932 ewsew.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2092 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 30 PID 2384 wrote to memory of 2092 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 30 PID 2384 wrote to memory of 2092 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 30 PID 2384 wrote to memory of 2092 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 30 PID 2384 wrote to memory of 3012 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2384 wrote to memory of 3012 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2384 wrote to memory of 3012 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2384 wrote to memory of 3012 2384 bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe 31 PID 2092 wrote to memory of 2932 2092 dofit.exe 34 PID 2092 wrote to memory of 2932 2092 dofit.exe 34 PID 2092 wrote to memory of 2932 2092 dofit.exe 34 PID 2092 wrote to memory of 2932 2092 dofit.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\dofit.exe"C:\Users\Admin\AppData\Local\Temp\dofit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\ewsew.exe"C:\Users\Admin\AppData\Local\Temp\ewsew.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5470456365dbdf08d67a707931b70b423
SHA1c1568446d3a6daf6e08ba343e1111b6f8cbd83d8
SHA256f0596ed299657ca0cc56dec4c2a6b056517a5697264f6fb5ae0f2df1f4995610
SHA512eef7c083f488e0161fef9dcd2dbd36821fa29c62407b0a2ceef20beef94dcf00969070314c9118237871075d0b60f43368795402236eb96c48cf3085489dca9c
-
Filesize
512B
MD5beccedc9cce86c4b0fb86cbef7577385
SHA1f48c0310f21011e17fce3faf27f4966efc79d6c3
SHA2568a2edf82e2780efb93d444285d93852741c416c4441f97c4740bd64a952e9b9f
SHA51234775d74d3603ecb8ba262d33f502a4cfe25f1379c55c2ac5f75bd0d1953731293cfd73cf5ad354ad70b297b26bcf2b9da60452aa66e6edd468e2932cec796d8
-
Filesize
505KB
MD501f2a129ec6049a0cb380beb4fd4cf11
SHA1ecf6a39a322c86afdc4216f7934a039f350a962e
SHA2565a0dde32c32d6bfb6eb294d1342391ec103afbe8e5c7ec4ea79a2808ae60d9ed
SHA512dca880812a9285d4b50a02f59fd6515be8525492e03298904ddf3199da644627c1f7cfe83d8a42f710d178027373b305eed38de93b4ac9202b1ca7f2369cbc13
-
Filesize
218KB
MD5c714ccf3f5896a2a54bc70ea0d3ecc7a
SHA18720c579eecfd92cf9ab9c37a5780102bb848c40
SHA2560de26e5d6a62fa365760c84854dd2becfc658f21fcec8185a1f10d056c3d2259
SHA51236b5e57926c9b9733dedfdb8d0890726ffa2c1a21d1dd2396b20f3a6e532528626d78febdddb628ff2b2918d8a68ae655cd6b030a868706a563d42936bf41c51