Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 14:05
Behavioral task
behavioral1
Sample
419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe
Resource
win7-20240903-en
General
-
Target
419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe
-
Size
629KB
-
MD5
65bcc6d98ef06f7a05fa1e6071bd4b7c
-
SHA1
4c9886823fd7909cb9e4bc4f1fec0a7727333613
-
SHA256
419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516
-
SHA512
091cbdd872abad97c056fe26b2787ea130ad98d3a2a10319587ab15c1ff0107b84065cf557e9a5642132b4192b83c3c8c45b3234e589386e6f7d9a78a0a4f6bc
-
SSDEEP
6144:hmbmLppYOuakY1q5Q4XMxvQ4x1OpGcm9VQl0lM/oJ4/gupe10L:hma6id1Q8zzkGHVqoq/gI
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2116 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3052 mulyr.exe 1812 vofum.exe -
Loads dropped DLL 3 IoCs
pid Process 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 3052 mulyr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vofum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mulyr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe 1812 vofum.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3052 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 30 PID 2068 wrote to memory of 3052 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 30 PID 2068 wrote to memory of 3052 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 30 PID 2068 wrote to memory of 3052 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 30 PID 2068 wrote to memory of 2116 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 31 PID 2068 wrote to memory of 2116 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 31 PID 2068 wrote to memory of 2116 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 31 PID 2068 wrote to memory of 2116 2068 419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe 31 PID 3052 wrote to memory of 1812 3052 mulyr.exe 34 PID 3052 wrote to memory of 1812 3052 mulyr.exe 34 PID 3052 wrote to memory of 1812 3052 mulyr.exe 34 PID 3052 wrote to memory of 1812 3052 mulyr.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe"C:\Users\Admin\AppData\Local\Temp\419f3b0e21c8d6841702e28dfdda3526f547219ffb39f9a3e5b7d56d0ce20516.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\mulyr.exe"C:\Users\Admin\AppData\Local\Temp\mulyr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\vofum.exe"C:\Users\Admin\AppData\Local\Temp\vofum.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD590ecf04d76a514f09e375302d375342e
SHA1aad04c4559360c6e7264268c75601ff1a11e9a13
SHA256d30dbb60eabe6a7995ece1c84b231146bee35bf630efd75368c4b4324dea9f3a
SHA512fe54a57e4cad4eb33af351c10ad3b416df41c8ece60ea47d84933599a285569bed19eff0610eb02813e2eadd8e1528afbda6e207948f19443f48513a504a7062
-
Filesize
512B
MD5b5c062bfefec82d8dcefd73d18b501b1
SHA1c658b6b2d8037d10d004803742915c919b8d68ab
SHA2560662ac8856fa1c93323cb1b7be66bf63547ffcdad3f9f521f74b427b09ea4482
SHA5122198fcaa145228d928ce54f0f711b0349cf0c65b0f6adc7f541811a95832ca7095cee41847491a95899c18d0e5c4d662f82f5211734793ffd73d5f273eabf677
-
Filesize
629KB
MD5fef3f568fc1a6367b9745cd6013f83dc
SHA12188764af98565f830c841202642aafe8af52452
SHA25603ef4e8c62f295fe171cdac996bd845b6717edf9c6952040879f325fd750feeb
SHA5121dd5992ff062094dcf7b0a80b18345f00f58a3b78ff7b648ccbbc72e94aa411a66e58b848193ba38d38e04f846c241cd1433d68a0527e414ad22acc9649064cc
-
Filesize
203KB
MD5e3b4223303e05709d22ed687f41942ca
SHA10ae714b03eec45dc1b6a3168cb9131661b0b3cac
SHA2565003f850252381fe65474c84b9c7263ef5b4f1ab9cd016429f6c92688dcda2ec
SHA5122bbfb9dd21c61042292af76d80d8d04f4ec6202d77b3a7410a6a4d3a8a658eeaddb04d5784985ea4ac91aa5b684646e0dc3a1a8999fa7512cce303ce817306ba