Analysis
-
max time kernel
89s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-02-2025 18:50
Behavioral task
behavioral1
Sample
d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe
Resource
win7-20240729-en
General
-
Target
d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe
-
Size
138KB
-
MD5
e71019797add3a8cefe684ddc98bfe4b
-
SHA1
62c3cc9c37856b9b257ad719e8db4dc616900adc
-
SHA256
d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182
-
SHA512
2974d8e3f201b18b3a0c2de6f18daa6e23f257685fca8238fa0f8119e574c6ab2e32eff607cb03ee127ef0fbb827c4a16fd075b36aa337b74db8053f8eb42010
-
SSDEEP
1536:pdcGogyTSvuuCu4cOK2y8uOZBkWdB2dsLjBS3+ZVkU2g/cmEyokjzw:p25gy6uuyXMdsLjs+vnc2okjE
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2272 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 poerte.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language poerte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2304 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 29 PID 2380 wrote to memory of 2304 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 29 PID 2380 wrote to memory of 2304 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 29 PID 2380 wrote to memory of 2304 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 29 PID 2380 wrote to memory of 2272 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 30 PID 2380 wrote to memory of 2272 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 30 PID 2380 wrote to memory of 2272 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 30 PID 2380 wrote to memory of 2272 2380 d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe"C:\Users\Admin\AppData\Local\Temp\d9f59d6ca5ea63939c323c38adc441f19dd4b1eb1a38bcce49fe734244ed5182.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\poerte.exe"C:\Users\Admin\AppData\Local\Temp\poerte.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5463fc3c0c0f9ccfd30adc51f377ca2b2
SHA14ead8ef5bb33115af11c83983e85cc8c2ebf5e3e
SHA256b19cb32e6ad18541bd0697d6b367ea5122f1163244c52dadfbd73b90edbb25fb
SHA51269f147706c1608054e356d180a96489f0faec9f6f98cc8c5a5c33a94c6163291d78979ca41634850fc6d3ee39eb19731593c8f18978b38786b5188be92dd8b58
-
Filesize
138KB
MD59368a3759a7a15060ffcd5c633cdd319
SHA19b0612357c2f4f17b178b4a75b280ed8910a0844
SHA256e49b1918f6f80dcdd38d61a8cf0e0caf5f0d9c599540757d572f06ad5e19277b
SHA5129a4887914ea745fd17c469b2daad787287b07c9bf4f84195123ff50237973a4429da44bd6b72b7b3de7507bc77a898a535730e44dfa2bda3c7fc7cc38278804d
-
Filesize
338B
MD514a2153f466be94ade772ea919a791d1
SHA14082a96686e88c53f2625005a7544c388f598d4a
SHA2566238d716499d36e6b2a8918f96f89b8c4df524623709c58d20b3daf91ccacf67
SHA5127a54dbd319bacb29838256d6480f6a2a698f95687bd97bb79d7e64951f376c81413f78be260c7898dd47185667758efd882d445c2f51e06c1c356364a8dc8e57