Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 15:46
Static task
static1
Behavioral task
behavioral1
Sample
9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe
Resource
win7-20240903-en
General
-
Target
9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe
-
Size
337KB
-
MD5
c1749cd7a60df883adf4d15377083478
-
SHA1
b89e18680af6018a480f4bb831a580be789711fd
-
SHA256
9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf
-
SHA512
3a29e2e822b263dd19fe1b2a10b25ffb75e0d4eb4c8e85d50e42ffed882b904a19266fe9d915a8cd62cdc9a42a61852e2426125e57db67951638824f4ceac33c
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKoa:vHW138/iXWlK885rKlGSekcj66civ
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2520 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3056 leluh.exe 1728 xuxyd.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 3056 leluh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leluh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xuxyd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe 1728 xuxyd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3056 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 30 PID 2100 wrote to memory of 3056 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 30 PID 2100 wrote to memory of 3056 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 30 PID 2100 wrote to memory of 3056 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 30 PID 2100 wrote to memory of 2520 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 31 PID 2100 wrote to memory of 2520 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 31 PID 2100 wrote to memory of 2520 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 31 PID 2100 wrote to memory of 2520 2100 9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe 31 PID 3056 wrote to memory of 1728 3056 leluh.exe 34 PID 3056 wrote to memory of 1728 3056 leluh.exe 34 PID 3056 wrote to memory of 1728 3056 leluh.exe 34 PID 3056 wrote to memory of 1728 3056 leluh.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe"C:\Users\Admin\AppData\Local\Temp\9cfa22a6022a17a247f9fa1fbdd50cd2347bee87d6a65d752eb2e883ad722abf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\leluh.exe"C:\Users\Admin\AppData\Local\Temp\leluh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\xuxyd.exe"C:\Users\Admin\AppData\Local\Temp\xuxyd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5b6e4312b24e36024f9be4452c1849b6a
SHA113008ddd8f6a8f27c9b38a96c06017f4eef6d296
SHA256f194a95ff2a879a8730113c1f2f3cf570dee5d609713e04e63e7089378fc99e7
SHA512be9bf5b9a124b14cfd5f4959382f3ce33eb2a26e9c2a6f5546be252974018f8df277e0917e0291d92fb86b695378050cd00aecf4fba97b8739794682f5c863f0
-
Filesize
512B
MD5e0d254be48eb4bc05f96eb5ac79c1d87
SHA1844151d653b9a185297af7693c40a051c425c062
SHA256a2f8b89fe3acf514851fd15d2373ec7cadbf37268f731adf6d2967916cccc068
SHA512273f0738229e70419fc1fff4617b7ae66bf82f7bd8a5cf6995d62fcd069bbd3fcc52c1a56083f830b31c6e1f10e5501ba74aaef0be01543a0f4f51e880685d6e
-
Filesize
337KB
MD5871d5062ca70df9cd7f3aca181efd2a1
SHA140610ada5d5dadc003dbb7880eb7a15bb17ad49b
SHA256cd4d80aeae2d289ce6e08a4dc5919fb02498d9bb11921e4056d8ef488666950a
SHA5124e20f4905883caed06b711a02733484d9130644a787fca628067e798fe2b1a1fa5ba47e9cde57bf066b09ef1e7c434924497e9b2aadc530a1716b652733ae0f6
-
Filesize
172KB
MD564f5a63bfafc56470b355057865807c7
SHA10543a70d2d8379766a45c1a68bc81faa8a1792bc
SHA256f5483491e17f2cf5a185eb52f7125c195ed43bce5c1f989e5783687fccb39650
SHA512841ee54c0253493f93355770b8d463e37755024cd7f0d171fe14e696817510241e3edc5bbb079718c879312c37286112e4fefa52cf89f17094c77e94108eed86
-
Filesize
337KB
MD5be896eabe4ff5ea51a7883c98e5c9894
SHA128a0774b58c15a03490258d70cdf37e30b7830c2
SHA2569ba475d2e535a493d247d9c05fbbbea6167122cd5fa05dac0a624f1d582d30ee
SHA512a6d32c499ef636405ba242aa771eadb1224eb244aa444bf5205a93b7215aae9832d9ab900d92492bf64eecd681258a334b4e7de0d95168a2f522e8c6da9d8c81