Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 08:27

General

  • Target

    NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe

  • Size

    465KB

  • MD5

    3837a2c234eba6152f5cfc9a5338ab73

  • SHA1

    d843b155d39229809bdef898ae48190d6f108847

  • SHA256

    8e620732f8541c584216d580057f165cbe982393eeed7c38d98fef2c335f2286

  • SHA512

    fbcc057cf4d4ee16296546e00cebdce20ade0a5930c4d023c5ee2c96a5d0fb9a3ed256dc0827c19c50012919635465af2a8fa96d300cefb64275314e089f625b

  • SSDEEP

    6144:k9H4y9VOpL/DeRRoSGFPRuDYBzFrY5dRA2AkCMnZi6c/2AS9kFwJARejm7C:kZF9VOpnqoSG1EcBhs9xAkLZMomC

Score
10/10

Malware Config

Extracted

Family

urelas

C2

121.88.5.183

218.54.30.235

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.3837a2c234eba6152f5cfc9a5338ab73.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\sander.exe
      "C:\Users\Admin\AppData\Local\Temp\sander.exe"
      2⤵
      • Executes dropped EXE
      PID:4028
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "
      2⤵
        PID:1028

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat

            Filesize

            287B

            MD5

            c06d75b573f85b204d70a5203f20f65d

            SHA1

            669035eaa6eed8808c0da743f4a91431071851d2

            SHA256

            ec40eac232f7d3d7ff74dfa9202b55acdb3cd58d0883f4736a69229d76d30430

            SHA512

            ff889f3e504d45e29763aef2c07ce4bf810b3e19eb451def62ff01e6fca9becab7ff2b09a551c45b9b843e3472f71f907c522e45220b4b46a1a2b269953e146a

          • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

            Filesize

            512B

            MD5

            178eba193b631d7b0653896453b678b2

            SHA1

            8878cae8fb5417248da5800e4d85b00149160404

            SHA256

            8c7800dfaf639b17e6b682b6fa2365275e6f80d07e6aa6bb56b676669d0e9db5

            SHA512

            936f9ec171c7ad5aa63c6691d9ea109a3f1ef31fe00bc26fe5afa8ae0ee21b5d3f65e873a242e7986f98bcb9abc82911dbf34bb907ed7a4973e959b7e90c69d5

          • C:\Users\Admin\AppData\Local\Temp\sander.exe

            Filesize

            465KB

            MD5

            230a383b273eee6491875026ed2f72d2

            SHA1

            27a18cff7a2f8e6ac6b34262ed2ac16f0efa9e92

            SHA256

            6baa81a16dcf1c45819afc7f182983da368a05f22b54b4db193acd1586ca381d

            SHA512

            6d7e3392d0a15d8ff53ea9079edb67e9179ec6198b009be99b9fe6f4e1df1024e59cb0495cd2d000ef203060075f724cc670ac8239ec74b401ff3551a4628a1b

          • C:\Users\Admin\AppData\Local\Temp\sander.exe

            Filesize

            465KB

            MD5

            230a383b273eee6491875026ed2f72d2

            SHA1

            27a18cff7a2f8e6ac6b34262ed2ac16f0efa9e92

            SHA256

            6baa81a16dcf1c45819afc7f182983da368a05f22b54b4db193acd1586ca381d

            SHA512

            6d7e3392d0a15d8ff53ea9079edb67e9179ec6198b009be99b9fe6f4e1df1024e59cb0495cd2d000ef203060075f724cc670ac8239ec74b401ff3551a4628a1b

          • C:\Users\Admin\AppData\Local\Temp\sander.exe

            Filesize

            465KB

            MD5

            230a383b273eee6491875026ed2f72d2

            SHA1

            27a18cff7a2f8e6ac6b34262ed2ac16f0efa9e92

            SHA256

            6baa81a16dcf1c45819afc7f182983da368a05f22b54b4db193acd1586ca381d

            SHA512

            6d7e3392d0a15d8ff53ea9079edb67e9179ec6198b009be99b9fe6f4e1df1024e59cb0495cd2d000ef203060075f724cc670ac8239ec74b401ff3551a4628a1b

          • memory/2216-0-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/2216-13-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/4028-16-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/4028-17-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB