Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 17:46

General

  • Target

    NEAS.31b7c1210dfeae627a127ae5157a6370_JC.exe

  • Size

    417KB

  • MD5

    31b7c1210dfeae627a127ae5157a6370

  • SHA1

    259ee363b009adaedc475199f18de31878a38e56

  • SHA256

    6170fd86b88c72d8aeac1d489f46f7438ed9a9ddad2baff7f7ee16e32146c993

  • SHA512

    83e103b8c0c7b4b63c5f238583c4ff39065a0b701c667d0997d8581d7c0560e1fc7db02307469eeb82712ece6ba314e5f362c4aadb074e5f0417f67f65df9a9c

  • SSDEEP

    6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOYDr:eU7M5ijWh0XOW4sEfeOir

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.31b7c1210dfeae627a127ae5157a6370_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.31b7c1210dfeae627a127ae5157a6370_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\ebnie.exe
      "C:\Users\Admin\AppData\Local\Temp\ebnie.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Users\Admin\AppData\Local\Temp\kihyg.exe
        "C:\Users\Admin\AppData\Local\Temp\kihyg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4112
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:2596

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

            Filesize

            292B

            MD5

            817f12111d56a3c574eb21343cd17f2c

            SHA1

            6783b212b1bac50046194bfaf8df46312a6143df

            SHA256

            94361efd3ad51e3a10ac8f47bfea6caa1c65a055f54633a730df0a97dc9d2ab8

            SHA512

            9a31b6628817ce8fe7b641c016edd965d8b6544636eb6caca70ee774dbe2b68c4fe8b45854732eb6eb52ea72ec57b0687275ac5d9c5c9de1125247d611b72ea8

          • C:\Users\Admin\AppData\Local\Temp\ebnie.exe

            Filesize

            417KB

            MD5

            7906381cc0e65b176d80fb6147fdf3c3

            SHA1

            aee026d3c3869c11cc98f18e0ee2a78945fa1464

            SHA256

            c4999aab833f80fa91c6e6bfa0486bd2dd20486e8a705cf7bcb07b16cf0807c7

            SHA512

            70be92fc8f7cfcf9fe1ec65e7d70de41e5fdf90987d92a71b4cd01c84b65106dac8259e8f23c3626a02d299d07c63f18e43a0594667981c02bbe2807800139d3

          • C:\Users\Admin\AppData\Local\Temp\ebnie.exe

            Filesize

            417KB

            MD5

            7906381cc0e65b176d80fb6147fdf3c3

            SHA1

            aee026d3c3869c11cc98f18e0ee2a78945fa1464

            SHA256

            c4999aab833f80fa91c6e6bfa0486bd2dd20486e8a705cf7bcb07b16cf0807c7

            SHA512

            70be92fc8f7cfcf9fe1ec65e7d70de41e5fdf90987d92a71b4cd01c84b65106dac8259e8f23c3626a02d299d07c63f18e43a0594667981c02bbe2807800139d3

          • C:\Users\Admin\AppData\Local\Temp\ebnie.exe

            Filesize

            417KB

            MD5

            7906381cc0e65b176d80fb6147fdf3c3

            SHA1

            aee026d3c3869c11cc98f18e0ee2a78945fa1464

            SHA256

            c4999aab833f80fa91c6e6bfa0486bd2dd20486e8a705cf7bcb07b16cf0807c7

            SHA512

            70be92fc8f7cfcf9fe1ec65e7d70de41e5fdf90987d92a71b4cd01c84b65106dac8259e8f23c3626a02d299d07c63f18e43a0594667981c02bbe2807800139d3

          • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

            Filesize

            512B

            MD5

            b5b599b09f148393aca9ccf3ed86c492

            SHA1

            9978b83484a93103dca21fcd85d97a78151b18ca

            SHA256

            baed5263def77af04b0974963f4ba9a84a802fbe8aaf42f6daece9efd5865487

            SHA512

            e5995cfc7853975e71cd20f837087d480c92787d0bd85e1d984a0b4bf9aa92283370701b6b243a7aa8af18ac4d8dc59919acf0b30e9d01c9a681b55ba75b1014

          • C:\Users\Admin\AppData\Local\Temp\kihyg.exe

            Filesize

            212KB

            MD5

            3aa8b96ccffdef3aa068330439044ab0

            SHA1

            58051c8a15a28ed998935d2468312ac1eebc25b0

            SHA256

            44b93adf62d7a63610892a4c7be8f95d6e85bdf2c4ba306f9f5891009fbaaf3c

            SHA512

            ce204939a37befd0a5aaa457f0def74a2079ec5063c8a64836fac5ac1b7b538274dc344af4f3e1d0fee14061040128dcc2e5bb6da24a13c6fc48a997c3a4c5bb

          • C:\Users\Admin\AppData\Local\Temp\kihyg.exe

            Filesize

            212KB

            MD5

            3aa8b96ccffdef3aa068330439044ab0

            SHA1

            58051c8a15a28ed998935d2468312ac1eebc25b0

            SHA256

            44b93adf62d7a63610892a4c7be8f95d6e85bdf2c4ba306f9f5891009fbaaf3c

            SHA512

            ce204939a37befd0a5aaa457f0def74a2079ec5063c8a64836fac5ac1b7b538274dc344af4f3e1d0fee14061040128dcc2e5bb6da24a13c6fc48a997c3a4c5bb

          • C:\Users\Admin\AppData\Local\Temp\kihyg.exe

            Filesize

            212KB

            MD5

            3aa8b96ccffdef3aa068330439044ab0

            SHA1

            58051c8a15a28ed998935d2468312ac1eebc25b0

            SHA256

            44b93adf62d7a63610892a4c7be8f95d6e85bdf2c4ba306f9f5891009fbaaf3c

            SHA512

            ce204939a37befd0a5aaa457f0def74a2079ec5063c8a64836fac5ac1b7b538274dc344af4f3e1d0fee14061040128dcc2e5bb6da24a13c6fc48a997c3a4c5bb

          • memory/3664-28-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB

          • memory/3664-10-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB

          • memory/3664-17-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB

          • memory/4112-26-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-29-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-30-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-27-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-32-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-33-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-34-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-35-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/4112-36-0x0000000000150000-0x00000000001E4000-memory.dmp

            Filesize

            592KB

          • memory/5056-0-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB

          • memory/5056-14-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB