Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 02:49
Static task
static1
Behavioral task
behavioral1
Sample
528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe
Resource
win7-20241010-en
General
-
Target
528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe
-
Size
338KB
-
MD5
10e2fa8201897abe94ee8145b99d11a0
-
SHA1
e2621ba40292cd86e116ebc7901b2de8c60de459
-
SHA256
528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313
-
SHA512
f88c73f5a06bbb54424aa508f3891abe1ab015524aa858364cbf84d358bb630518db999db9b715ca2bfc700ce3568767f23eea3509044e4f234e5b251ac9ecea
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKoJ8:vHW138/iXWlK885rKlGSekcj66ciT
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1892 zebuf.exe 2964 ujmoy.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 1892 zebuf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zebuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujmoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe 2964 ujmoy.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1892 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 30 PID 2100 wrote to memory of 1892 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 30 PID 2100 wrote to memory of 1892 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 30 PID 2100 wrote to memory of 1892 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 30 PID 2100 wrote to memory of 2816 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 31 PID 2100 wrote to memory of 2816 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 31 PID 2100 wrote to memory of 2816 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 31 PID 2100 wrote to memory of 2816 2100 528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe 31 PID 1892 wrote to memory of 2964 1892 zebuf.exe 33 PID 1892 wrote to memory of 2964 1892 zebuf.exe 33 PID 1892 wrote to memory of 2964 1892 zebuf.exe 33 PID 1892 wrote to memory of 2964 1892 zebuf.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe"C:\Users\Admin\AppData\Local\Temp\528e1b35841ecf52deb513f19caf0f60f471eb631e3effc4ca1ff660cf308313N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\zebuf.exe"C:\Users\Admin\AppData\Local\Temp\zebuf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\ujmoy.exe"C:\Users\Admin\AppData\Local\Temp\ujmoy.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD57b071ac6037265e10c825e8e9bc3e7fd
SHA12a32815c173e776bf6924d4528af35e946a1f255
SHA2565221050afb0f70db89a4d643ace6b3cf55767cd99757c1df997143cc9bd2ce03
SHA512d1701eb5519014eaab6e472724fc83399121ff537ead521bff0dcdefac746d5bff690380063ba55373850a56134a46a8e5c19595a9e9cc7e91c2c58d0add1a84
-
Filesize
512B
MD51301cfcd81b5605d3234de1c50d007f2
SHA105ab0fa84ccb97cffd985fe7f901f9a48e429242
SHA256b2c56f659f7e5d1f60b1c6e4fbc7d92ec2c54a12706b24ec4062753a65d08e20
SHA51222af6d4e0068ac51ecd93d31194af1d24743fae39d93e2b4ebc3a28826fb0860066c40c2609bca46c18850801dcf5baf6d9a6750cd22e05a583410b8e5b8bbb6
-
Filesize
172KB
MD569e131938d8e1230ed3463f67ad1e789
SHA1a23c1b631ea24fa3146f9003d6fdf745039909ba
SHA2560b8e51773c77df2fbef8d7378e134b716bf0d171983f6f0ba6401c6b3acd989a
SHA512078aba14c8b4bc9362fce781bac43b8b7f7f4bc1217be023ccafe83314ef63345ebb00b5f5bab7dd8083a2e7919903963c2a8c39230d476263614353637a14d5
-
Filesize
338KB
MD5ada543e069e32e57dabe9e60319290b7
SHA1f1fe9606e1b4f70c15259f301162fd2c9f57e336
SHA25697a021021d1ae47b5fccc0ed4ccc61f183510ed134ec7e5b7a299b82b409b32c
SHA512eef0dbe53a16ac786511fda50cc596f858ee5a973332e4dec4b9f079c8cb50032ba10dfa93f28bd1930e0de3daaebe0b136fc38fa20a1ad51e3f861798ebabaf