Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 01:29
Static task
static1
Behavioral task
behavioral1
Sample
dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe
Resource
win7-20240903-en
General
-
Target
dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe
-
Size
337KB
-
MD5
2ce6c45531d66440c0c8d873ea9fee60
-
SHA1
d1807d51421c176e6b59c7e401ccbf10e488fa7e
-
SHA256
dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4
-
SHA512
583805c1320b19ca44ba4e496d3ba068a0dc7a412f96a270d4a80d7a33b49040b03d8ca3065bdc8649f166d686fc54c07aa8a4238cc1dccf78ecd5bbd2a05c54
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKoa:vHW138/iXWlK885rKlGSekcj66ciP
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 352 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2336 keruq.exe 2352 nodak.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 2336 keruq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keruq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nodak.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe 2352 nodak.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2336 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 30 PID 2392 wrote to memory of 2336 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 30 PID 2392 wrote to memory of 2336 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 30 PID 2392 wrote to memory of 2336 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 30 PID 2392 wrote to memory of 352 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 31 PID 2392 wrote to memory of 352 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 31 PID 2392 wrote to memory of 352 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 31 PID 2392 wrote to memory of 352 2392 dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe 31 PID 2336 wrote to memory of 2352 2336 keruq.exe 34 PID 2336 wrote to memory of 2352 2336 keruq.exe 34 PID 2336 wrote to memory of 2352 2336 keruq.exe 34 PID 2336 wrote to memory of 2352 2336 keruq.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe"C:\Users\Admin\AppData\Local\Temp\dc777e7ef05d8a6f162fdf5240cbc4e20d46fcb86632636e7c5f108be019e3b4N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\keruq.exe"C:\Users\Admin\AppData\Local\Temp\keruq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\nodak.exe"C:\Users\Admin\AppData\Local\Temp\nodak.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5afa2643704a00f92eae795c03cd97c08
SHA18577ed73b7e16c5e9adc919b91d7904249548afa
SHA256dbb261a200543e4a82ad4b487c626a6ed3f71f14d83af99079e1a047b6ad5e11
SHA5120b490ce654b85303043a2e24e10814f70f172babc16cc0b2770c74e63e1068d0740700832629d4973da5cbce2d87d18cf42003744496bf2304049bdb9df6a06c
-
Filesize
512B
MD5774e1f73329b1ef20404848cf1de403f
SHA1ff328d3b0ef87c8764ac0082d98009ac81fc0091
SHA256b9933efc0bff07e9efada91d56812f6bd0233d5df7fce6ba642c346636eb6d39
SHA51207caf3656aa789813e35bd11cfcf64327154782d486cc8400186e3a16f28264c84eda86b63c24c7eaa0bae22541ece1e893cc4441d6c13ce074fa442bcf87d89
-
Filesize
337KB
MD5888a87a016d64656417ae148a235a893
SHA1948977dbca34f6f291859d8f44e98c10f9ca6313
SHA256a4c0667657b3a444fda23d44ebb788d465e025e6d0399b9a34cf8340142896ee
SHA5123f6e41b9fdf73771c98b648c7b507a7b08ba33bf9ba585bf3fb069c8e96e64dbc551493787e42ed5a0bb006fc1acbbe5d15d5d36c45391bc7b1e3a1a4306774e
-
Filesize
172KB
MD588229393ab1e227d797c0bb356209bb4
SHA16ebf0c8c05b25f277991121bf37406d96b028d85
SHA25685da2e603b01efd7bb789535485c4c5884ecc62139ab1c5e59d96dee7cc553c2
SHA51272e879271268364a641bd37a5f1d243cdce0b361ff7d129212051a783abe249210b7af4a4a22180de8d7e67cb2d5f68b4458119682d595bdbe55390d2890a551