Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 00:53
Static task
static1
Behavioral task
behavioral1
Sample
b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe
Resource
win7-20240903-en
General
-
Target
b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe
-
Size
338KB
-
MD5
2b943ee14b3fcd4d5986b1e10de923c0
-
SHA1
126da8396b67a6576c88678d9c71bbdc860eeee6
-
SHA256
b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815
-
SHA512
f0040014214a389814da9e895e1d333be6e294edbd143e2bef4db7c6c89ffb35c305dd4db849a0ce726d2e7d5974035dfa4d20434b1257f08fc6761866e326c1
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKogA:vHW138/iXWlK885rKlGSekcj66cis
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2528 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3052 nuzim.exe 2672 pewai.exe -
Loads dropped DLL 2 IoCs
pid Process 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 3052 nuzim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuzim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pewai.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe 2672 pewai.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3052 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 30 PID 1308 wrote to memory of 3052 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 30 PID 1308 wrote to memory of 3052 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 30 PID 1308 wrote to memory of 3052 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 30 PID 1308 wrote to memory of 2528 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 31 PID 1308 wrote to memory of 2528 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 31 PID 1308 wrote to memory of 2528 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 31 PID 1308 wrote to memory of 2528 1308 b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe 31 PID 3052 wrote to memory of 2672 3052 nuzim.exe 34 PID 3052 wrote to memory of 2672 3052 nuzim.exe 34 PID 3052 wrote to memory of 2672 3052 nuzim.exe 34 PID 3052 wrote to memory of 2672 3052 nuzim.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe"C:\Users\Admin\AppData\Local\Temp\b30902b7c0847bab4dfe23fda0e0f06bee4acadb38414aa0b5ff077fae349815N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\nuzim.exe"C:\Users\Admin\AppData\Local\Temp\nuzim.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\pewai.exe"C:\Users\Admin\AppData\Local\Temp\pewai.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD565abadae7463d90004aa7d5b0c2ae35a
SHA1a4a95bd5e8c540bb83546286f31451a59ab2d77c
SHA2560744cd2dd7d7a3a618b247817032cd9505f545cdedb59b35488e687be947fcd9
SHA5126c35c023b335618fe7d112bfa2b46197317767bfb87ab34d66e05a5c123c440011ce6dc6e1973bfca0302418255366f12560214b42c8904782bf4fb334fd276c
-
Filesize
512B
MD59eb2296af05edd450bd81f6397196602
SHA17ae1222b58a8e66c11b6446c96fbed6fda4817da
SHA2560e612cf8a452006dfae83c96edae01133150643064abb4d57a0fd21d8b958cc3
SHA51210eae88c723283225ec7615c2aad02a2ac7a9123a174df4e6d5ab5276b4c2a962456107017400a42f2d0091cbf0c7b9d1ae55a32b4cf0a30c2c693077c57ad7a
-
Filesize
338KB
MD526e645972c3564599c1f7dfe96565806
SHA1affb6198759ee55225dc30cb3cb2a576dc490d2f
SHA256e085f44738b4e3f611e39a3613b3b45a5615ccf7aef9761262a4a83a82829ff9
SHA512a72c912f1a1b240379f5f58a3b3e80a325745ded0d95681f0e296d61fb6bbb06d207ba1c4282ca30bb49dbc404f4719709c2bb761e9e71cf0fea481ff1b40655
-
Filesize
338KB
MD5e836e7359215b08e75a31bfa74d3bb72
SHA1809a05221c45db92323431ba1d90fc6d79e1dced
SHA256441d92940ba45326e6058128403d14478332241dd829954f7b790461e01d25b0
SHA512484d3eb51b93a53485cc45bcbc9c2a3dd83d5b18e6e17619b2ed32c1704dbc5d854bdd3f659d40a1ce0f1da69b3db290a87c153ca0f14c9957326e5de58ff833
-
Filesize
172KB
MD5467ba3053a2c5b5174801e18265b353e
SHA10ddefce027976cfab129b9f32fe0f26865dcebee
SHA256813694662706f7c9647148937cc8daf2b8ec60c286400841d3269ccfef04536d
SHA512d7a75a68fea4f92cdadec5eb6a363e9c87bf83186cef16b7365f2b46e1c5589767d9defc2154f51db110caad65420567d4648adeeb719b5524692d0f06cf455b