Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 17:04
Static task
static1
Behavioral task
behavioral1
Sample
fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe
Resource
win7-20240903-en
General
-
Target
fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe
-
Size
338KB
-
MD5
d4f84cfe896e1c29f6a5f32291e3f5f0
-
SHA1
c8a9f5efad1e6e4fb33fde015d5baca8de03e98e
-
SHA256
fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16
-
SHA512
664f50bb70540093bdc592b929b9b8d0d7ddc116badf24ddca8a049f8c648d5a69cfa4cb38fc1b2282edb8185a3bf0c8f858db2ef039b157d87e4002e26f4dfa
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKo5pN:vHW138/iXWlK885rKlGSekcj66ci8
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2884 zaowx.exe 2280 touss.exe -
Loads dropped DLL 2 IoCs
pid Process 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 2884 zaowx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zaowx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language touss.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe 2280 touss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2884 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 31 PID 2956 wrote to memory of 2884 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 31 PID 2956 wrote to memory of 2884 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 31 PID 2956 wrote to memory of 2884 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 31 PID 2956 wrote to memory of 2696 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 32 PID 2956 wrote to memory of 2696 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 32 PID 2956 wrote to memory of 2696 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 32 PID 2956 wrote to memory of 2696 2956 fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe 32 PID 2884 wrote to memory of 2280 2884 zaowx.exe 35 PID 2884 wrote to memory of 2280 2884 zaowx.exe 35 PID 2884 wrote to memory of 2280 2884 zaowx.exe 35 PID 2884 wrote to memory of 2280 2884 zaowx.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe"C:\Users\Admin\AppData\Local\Temp\fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\zaowx.exe"C:\Users\Admin\AppData\Local\Temp\zaowx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\touss.exe"C:\Users\Admin\AppData\Local\Temp\touss.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD58df63a479fe943d1cd0889f78578bcc4
SHA12e3c4709c101483ff6a957cf663547302fbf6044
SHA25644d061a9f0f95cec27c521183ffcd27a19d9254ecfe37ffd25c6e68b621407a7
SHA512aa22e55f16de8e7d01cf78b505eb371f4149c662b9b7b6550f238a1d3bd1b7f934904c38d824b2b5d7ddedaaa98c64501b1ff06488ed2703eef97dd28e850b50
-
Filesize
512B
MD539319960c782a32700f0f7334d70f9a2
SHA1ca8421a6f9708a8ad743619d2f8c9130cc795498
SHA256c4d2793fdf14e67157c15a0ccb1e9498341482993a709e6e9189def647724473
SHA512f21174f50a0a9c00f18984796a46c99efdfb68ed07a55b2a5daa0c3c9bccadde7373b54af51f91c84ed19a579284874b15dd9c3a92b8270d3f33d9310662d1d9
-
Filesize
172KB
MD5c5a122d87f76bfd9cab9d136f28a45d3
SHA16f4addb05fd4e5539e175fd574901bba68dc138f
SHA256067ab7a5efed848fa453707766c22be429165d0b0f52eeae557bed01b4a25ebe
SHA512122492dae9d1f94259d4805d9f9912aa2110fdea5b573ddd22781557fc44dcea04a5e72771066ebf74722d8f5033be1cbd9bc8dd783ce031d637434af1d31e55
-
Filesize
338KB
MD5f99ac5c667e595e9d92ae9dc0d0679fc
SHA1f1ad82a3fb15b7220344fc463f388a48b7e04442
SHA256066dd362876af582ee3adfcd9ded4fe3833384661003712412208ade55aa288e
SHA512ff91bd681654a21dddb50ca669874d87e0446d0a83147406bbf4b9ecb7e68cedea27cec075dd9743d58d57116aaac057e7aff78053e711af1c2c15950d7b83d0