Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2023, 18:15

General

  • Target

    adf3aab71c184a8a1ae41811796d0c77_JC.exe

  • Size

    460KB

  • MD5

    adf3aab71c184a8a1ae41811796d0c77

  • SHA1

    d97fb23ebd15b5307327c63e65e8a8fcf1e84106

  • SHA256

    fe1234bba5afb9fc0c7f6abb4a45220fed9468da934c26e7217e3bc8c3b8029a

  • SHA512

    170eccf9835ed72e11e98d2683fd3f448861b9f3053d8132f3e5c1e1abfdabe61675ee71869a639ab823d336a2ce511a59109dbbddb584b9592b48236936959d

  • SSDEEP

    6144:LEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhVOpdFRdmp:LMpASIcWYx2U6hAJV/

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adf3aab71c184a8a1ae41811796d0c77_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\adf3aab71c184a8a1ae41811796d0c77_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\qukut.exe
      "C:\Users\Admin\AppData\Local\Temp\qukut.exe" hi
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\kohydi.exe
        "C:\Users\Admin\AppData\Local\Temp\kohydi.exe" OK
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Users\Admin\AppData\Local\Temp\vywyj.exe
          "C:\Users\Admin\AppData\Local\Temp\vywyj.exe"
          4⤵
          • Executes dropped EXE
          PID:2476
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
          4⤵
            PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
        2⤵
        • Deletes itself
        PID:2648

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

            Filesize

            282B

            MD5

            cc31b078999657d2aaacea7880e3f220

            SHA1

            977d09e641d13a458985a02d18969aae834fb111

            SHA256

            6fd5ea02d944d17bb2ed0198f308c96433fa33e0ef9a9edf2b8a71ec621b17ad

            SHA512

            183a483f0205a3ff008ae3a7e807d95705984f6d063473461ba26623465c4fa44dca20c362779c1e0a628c7d3c54f756ef505924723fd5cc62900fec00bc3c27

          • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

            Filesize

            282B

            MD5

            cc31b078999657d2aaacea7880e3f220

            SHA1

            977d09e641d13a458985a02d18969aae834fb111

            SHA256

            6fd5ea02d944d17bb2ed0198f308c96433fa33e0ef9a9edf2b8a71ec621b17ad

            SHA512

            183a483f0205a3ff008ae3a7e807d95705984f6d063473461ba26623465c4fa44dca20c362779c1e0a628c7d3c54f756ef505924723fd5cc62900fec00bc3c27

          • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

            Filesize

            224B

            MD5

            54e06f471bea9961825e0595a1da55bf

            SHA1

            72a7bb147c2f4bbcbd33041dfb8bb702f51cb577

            SHA256

            7e3b23605d6ec32088e1c5a5da1fe8c95d3bd31efd4b8d0d6860178777da4297

            SHA512

            485cc205815029aa4f7aa8ebd09067cdfcb2a3e8ad938b4eddcdf3bf478b000fbb4c5dc721c0e861c73314637139b026f1ec14ab704e427f173f7d10daed6b48

          • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

            Filesize

            224B

            MD5

            54e06f471bea9961825e0595a1da55bf

            SHA1

            72a7bb147c2f4bbcbd33041dfb8bb702f51cb577

            SHA256

            7e3b23605d6ec32088e1c5a5da1fe8c95d3bd31efd4b8d0d6860178777da4297

            SHA512

            485cc205815029aa4f7aa8ebd09067cdfcb2a3e8ad938b4eddcdf3bf478b000fbb4c5dc721c0e861c73314637139b026f1ec14ab704e427f173f7d10daed6b48

          • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

            Filesize

            512B

            MD5

            87287c4e7ca13016d759501eaeb0a6ae

            SHA1

            fd9861cca3172a433095fd6a1ec18140b3a5d917

            SHA256

            f0601b63d8cce2bfe473372f9730a2b1b2ed6d598f1e242820d083e68b473231

            SHA512

            b5ed1339ff7abfa8734931ee8a51d4f703a8e812351ad0c372efa6f245b2b4fdd980189dd08f514551ccf2576fad3c829a95de2eacb005c00c9a68cd25e21e72

          • C:\Users\Admin\AppData\Local\Temp\kohydi.exe

            Filesize

            460KB

            MD5

            c612d6ee769d96dd463e7d5a0be99a66

            SHA1

            8de206765e5a88a48bc5beb5ade46c613bcaf0c2

            SHA256

            c796b792724d2b37e6ec77fd4b90ace8bc1f911da5d179d2b4f2db1cd9f7934c

            SHA512

            725bda91946da6a3db09b7acac4feaf152cd6042ba594784ec9673ba3461ba4dd9b6fd9dc298ffaa21e9a3d464e352b066c859f7d216e98bcd992719574e819b

          • C:\Users\Admin\AppData\Local\Temp\kohydi.exe

            Filesize

            460KB

            MD5

            c612d6ee769d96dd463e7d5a0be99a66

            SHA1

            8de206765e5a88a48bc5beb5ade46c613bcaf0c2

            SHA256

            c796b792724d2b37e6ec77fd4b90ace8bc1f911da5d179d2b4f2db1cd9f7934c

            SHA512

            725bda91946da6a3db09b7acac4feaf152cd6042ba594784ec9673ba3461ba4dd9b6fd9dc298ffaa21e9a3d464e352b066c859f7d216e98bcd992719574e819b

          • C:\Users\Admin\AppData\Local\Temp\kohydi.exe

            Filesize

            460KB

            MD5

            c612d6ee769d96dd463e7d5a0be99a66

            SHA1

            8de206765e5a88a48bc5beb5ade46c613bcaf0c2

            SHA256

            c796b792724d2b37e6ec77fd4b90ace8bc1f911da5d179d2b4f2db1cd9f7934c

            SHA512

            725bda91946da6a3db09b7acac4feaf152cd6042ba594784ec9673ba3461ba4dd9b6fd9dc298ffaa21e9a3d464e352b066c859f7d216e98bcd992719574e819b

          • C:\Users\Admin\AppData\Local\Temp\qukut.exe

            Filesize

            460KB

            MD5

            e89fceb67235ccd97038acf54e4219e2

            SHA1

            2084776910d13965360effe22b037dd34665dad4

            SHA256

            d01c28e4c837d8f6cf9c0cf4587e24e65e6b40a12798c993591fea63259d4e61

            SHA512

            4d3878654c6e35ef0d3c905886c0ac786231f0c38414f84a650bd13296352e7b96d24e3533c0c9480b82e1f73a66031caf80da94d28733d9b7af38590e17466b

          • C:\Users\Admin\AppData\Local\Temp\qukut.exe

            Filesize

            460KB

            MD5

            e89fceb67235ccd97038acf54e4219e2

            SHA1

            2084776910d13965360effe22b037dd34665dad4

            SHA256

            d01c28e4c837d8f6cf9c0cf4587e24e65e6b40a12798c993591fea63259d4e61

            SHA512

            4d3878654c6e35ef0d3c905886c0ac786231f0c38414f84a650bd13296352e7b96d24e3533c0c9480b82e1f73a66031caf80da94d28733d9b7af38590e17466b

          • C:\Users\Admin\AppData\Local\Temp\vywyj.exe

            Filesize

            223KB

            MD5

            e49f854e89efccdd4ad6da27017f31fb

            SHA1

            55009eb84c9db1fcca3057740cfffe277a6faf35

            SHA256

            a485edde5cae476bc7d32b3e4d49929c18a0514b1d3d264b61bbc407cdb81417

            SHA512

            d3b2791cfe81a696debca0d0ca0b88f9357dad25a2a24b8863db9d6a408f4b6077eed33d8e424ad81d6087b7d44e48c303ef69f8fb961d62f2f25db7a4110ec3

          • C:\Users\Admin\AppData\Local\Temp\vywyj.exe

            Filesize

            223KB

            MD5

            e49f854e89efccdd4ad6da27017f31fb

            SHA1

            55009eb84c9db1fcca3057740cfffe277a6faf35

            SHA256

            a485edde5cae476bc7d32b3e4d49929c18a0514b1d3d264b61bbc407cdb81417

            SHA512

            d3b2791cfe81a696debca0d0ca0b88f9357dad25a2a24b8863db9d6a408f4b6077eed33d8e424ad81d6087b7d44e48c303ef69f8fb961d62f2f25db7a4110ec3

          • \Users\Admin\AppData\Local\Temp\kohydi.exe

            Filesize

            460KB

            MD5

            c612d6ee769d96dd463e7d5a0be99a66

            SHA1

            8de206765e5a88a48bc5beb5ade46c613bcaf0c2

            SHA256

            c796b792724d2b37e6ec77fd4b90ace8bc1f911da5d179d2b4f2db1cd9f7934c

            SHA512

            725bda91946da6a3db09b7acac4feaf152cd6042ba594784ec9673ba3461ba4dd9b6fd9dc298ffaa21e9a3d464e352b066c859f7d216e98bcd992719574e819b

          • \Users\Admin\AppData\Local\Temp\qukut.exe

            Filesize

            460KB

            MD5

            e89fceb67235ccd97038acf54e4219e2

            SHA1

            2084776910d13965360effe22b037dd34665dad4

            SHA256

            d01c28e4c837d8f6cf9c0cf4587e24e65e6b40a12798c993591fea63259d4e61

            SHA512

            4d3878654c6e35ef0d3c905886c0ac786231f0c38414f84a650bd13296352e7b96d24e3533c0c9480b82e1f73a66031caf80da94d28733d9b7af38590e17466b

          • \Users\Admin\AppData\Local\Temp\vywyj.exe

            Filesize

            223KB

            MD5

            e49f854e89efccdd4ad6da27017f31fb

            SHA1

            55009eb84c9db1fcca3057740cfffe277a6faf35

            SHA256

            a485edde5cae476bc7d32b3e4d49929c18a0514b1d3d264b61bbc407cdb81417

            SHA512

            d3b2791cfe81a696debca0d0ca0b88f9357dad25a2a24b8863db9d6a408f4b6077eed33d8e424ad81d6087b7d44e48c303ef69f8fb961d62f2f25db7a4110ec3

          • \Users\Admin\AppData\Local\Temp\vywyj.exe

            Filesize

            223KB

            MD5

            e49f854e89efccdd4ad6da27017f31fb

            SHA1

            55009eb84c9db1fcca3057740cfffe277a6faf35

            SHA256

            a485edde5cae476bc7d32b3e4d49929c18a0514b1d3d264b61bbc407cdb81417

            SHA512

            d3b2791cfe81a696debca0d0ca0b88f9357dad25a2a24b8863db9d6a408f4b6077eed33d8e424ad81d6087b7d44e48c303ef69f8fb961d62f2f25db7a4110ec3

          • memory/2160-0-0x0000000000400000-0x000000000046E000-memory.dmp

            Filesize

            440KB

          • memory/2160-8-0x00000000026F0000-0x000000000275E000-memory.dmp

            Filesize

            440KB

          • memory/2160-19-0x0000000000400000-0x000000000046E000-memory.dmp

            Filesize

            440KB

          • memory/2476-50-0x0000000000400000-0x00000000004A0000-memory.dmp

            Filesize

            640KB

          • memory/2624-30-0x0000000000400000-0x000000000046E000-memory.dmp

            Filesize

            440KB

          • memory/2624-49-0x0000000003510000-0x00000000035B0000-memory.dmp

            Filesize

            640KB

          • memory/2624-41-0x0000000003510000-0x00000000035B0000-memory.dmp

            Filesize

            640KB

          • memory/2624-51-0x0000000000400000-0x000000000046E000-memory.dmp

            Filesize

            440KB

          • memory/2624-28-0x0000000000400000-0x000000000046E000-memory.dmp

            Filesize

            440KB

          • memory/3060-11-0x0000000000400000-0x000000000046E000-memory.dmp

            Filesize

            440KB

          • memory/3060-27-0x0000000000400000-0x000000000046E000-memory.dmp

            Filesize

            440KB