Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 16:43
Static task
static1
Behavioral task
behavioral1
Sample
f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe
Resource
win7-20240903-en
General
-
Target
f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe
-
Size
75KB
-
MD5
7015f3bc0a7664f85ff31387f5c654a0
-
SHA1
50c7dae5554e0fcede01f4a96695f7e5ab835763
-
SHA256
f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2
-
SHA512
bde6bd2d654b710a3ecf6a06832b00c1ff7b760964633018ef7490c2f6dad9e12004ea3ae881ea8acd710e76929fa80dc73c9abdbdf65c0689fa8cd41882b242
-
SSDEEP
1536:JBsRUZ2mpkX27tLUgk98l6h0JBDrDI6Rg4dOE:7NXkX27t5k8JRDIkgI
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1680 dofhir.exe -
Loads dropped DLL 1 IoCs
pid Process 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dofhir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1680 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 30 PID 1628 wrote to memory of 1680 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 30 PID 1628 wrote to memory of 1680 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 30 PID 1628 wrote to memory of 1680 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 30 PID 1628 wrote to memory of 2924 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 31 PID 1628 wrote to memory of 2924 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 31 PID 1628 wrote to memory of 2924 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 31 PID 1628 wrote to memory of 2924 1628 f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe"C:\Users\Admin\AppData\Local\Temp\f368d0cbd9ce95eb9e133d761222461be509513e28ed5eea600844bbba5904a2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\dofhir.exe"C:\Users\Admin\AppData\Local\Temp\dofhir.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD54adffbc578ceaad93e361c4c2700b4e2
SHA13078a1c96cf37ee1bde1a548cec44c27f7a8720e
SHA256d0270cf0cebe5fc51dc8d55ffc5d23fcbb682d1822458bcb3d823101ba0a2045
SHA512812400e5e01e5fbaf7917f3d48a40f6d0c6f60bf2602f2827c2d9089022ebf174d04d79bf27bfb67638c78d0b3a86b26e7d4546243491ebb7955f456b9fd9245
-
Filesize
340B
MD59cd13ce5550efb114af6fef5f0b175ed
SHA10328aa28ea33edf45c14a7c7799162fdd94c5b27
SHA25675f49c2eb60c1b91317a5dc029b8b4f196926c2887618f4addf32d3c94e097ce
SHA5125bcef3a23c4637b2a08fa6d3fcbd3a00a9f9e771f55568697a8a8fd816f5b745ac36df54adb6dc373a66ce7499439232ed2d28531819bbb92dce68c99534aff1
-
Filesize
75KB
MD5012c78408c20876f6cddab790baf93e2
SHA19701ea31169273eb524a39614f14ad881d94580a
SHA256cac746c7a27fbbed653befb919f02b879e19c8517b77f03b307232cc75c880f7
SHA5127d1778dcc428985fa87e0d6df6c1c33f2ef03ad5389a2a076214d289ec561ff4b52947633906906e5e8eef94c4a70c75900815cee341c0302b2113cca3503577