Analysis

  • max time kernel
    199s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2023 17:52

General

  • Target

    NEAS.5c0f0962b050399f72bffc051720c165.exe

  • Size

    195KB

  • MD5

    5c0f0962b050399f72bffc051720c165

  • SHA1

    58dd5d89316c04d92997e85f8a18fe7b339155e7

  • SHA256

    8cedfb1d7306c80e93b354efbcaf1fb1913ac74079bd36e43f753740a7253ae6

  • SHA512

    bf681ba986bee0b88345c82e38d4eea22bcaccdd557e066e466fa0fb957b1a0ec18f28a436755be96b404b51da67c268de463f14463f7b45bb76e6e3cf72b830

  • SSDEEP

    3072:ulOCNlACeMKV6ETiiXd60iuic+XzoWad5N443nsexP:ugCNSv6p8lec+cTiqsexP

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.5c0f0962b050399f72bffc051720c165.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.5c0f0962b050399f72bffc051720c165.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      PID:4356
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:5068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

      Filesize

      195KB

      MD5

      fe1c1fc6efd5a18ca047e71b4c160402

      SHA1

      780c09f80bd4589f2db749734982c08793e290c5

      SHA256

      a8ae02fc336815bba40cf7c4134002deb3d341857b2a5e2725d73d527153d256

      SHA512

      ac31d54168a1136cdfbea4da551e2e0142c3b33c4aee603d0124bbd5b85dea773cefeea602cfe0c8703007b956514c270653d00b00e9a933370e98d4ac421a7b

    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

      Filesize

      195KB

      MD5

      fe1c1fc6efd5a18ca047e71b4c160402

      SHA1

      780c09f80bd4589f2db749734982c08793e290c5

      SHA256

      a8ae02fc336815bba40cf7c4134002deb3d341857b2a5e2725d73d527153d256

      SHA512

      ac31d54168a1136cdfbea4da551e2e0142c3b33c4aee603d0124bbd5b85dea773cefeea602cfe0c8703007b956514c270653d00b00e9a933370e98d4ac421a7b

    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

      Filesize

      195KB

      MD5

      fe1c1fc6efd5a18ca047e71b4c160402

      SHA1

      780c09f80bd4589f2db749734982c08793e290c5

      SHA256

      a8ae02fc336815bba40cf7c4134002deb3d341857b2a5e2725d73d527153d256

      SHA512

      ac31d54168a1136cdfbea4da551e2e0142c3b33c4aee603d0124bbd5b85dea773cefeea602cfe0c8703007b956514c270653d00b00e9a933370e98d4ac421a7b

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      ae2bc1a0af002d17af7a85dce0028d6d

      SHA1

      c484b779aaead2f1d9e3b770fb7766f871a45e81

      SHA256

      9e3db9db2402a201b1ea8f8fbd4e0a857b13188d05685bc56ef7bddd88d26571

      SHA512

      c2ff1d2c53fd5b57b8890fab8db7bb5af42a0a88eb3849843e9ea9178c85579fd80c4d1782372be822be347e8466002b9455ec5d5f0c8a97a60b93e720b11975

    • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

      Filesize

      284B

      MD5

      4a5e58efa5d50eb3658cd8a64d558aea

      SHA1

      b14308182089777db315be0b5dc6de57ec5afb36

      SHA256

      00b22f9db812019d6371144efbaebebf52315abf59cdfd5a9e0c820ab349cc00

      SHA512

      df1686acbc3e36a00d2c81b33f49198635250a01872c0ff7a875b0caa6f18ff2e65989fc3362e551334f4aa2d76964cba5d3eeac956953aeb842e2a5dd43d194

    • memory/2344-0-0x0000000000AB0000-0x0000000000AE7000-memory.dmp

      Filesize

      220KB

    • memory/2344-1-0x0000000000AB0000-0x0000000000AE7000-memory.dmp

      Filesize

      220KB

    • memory/2344-18-0x0000000000AB0000-0x0000000000AE7000-memory.dmp

      Filesize

      220KB

    • memory/4356-16-0x0000000000060000-0x0000000000097000-memory.dmp

      Filesize

      220KB

    • memory/4356-20-0x0000000000060000-0x0000000000097000-memory.dmp

      Filesize

      220KB

    • memory/4356-22-0x0000000000060000-0x0000000000097000-memory.dmp

      Filesize

      220KB