Analysis

  • max time kernel
    122s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2023 21:57

General

  • Target

    NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe

  • Size

    205KB

  • MD5

    ba5b02757abb9900da0ebf8be2828090

  • SHA1

    3865b529b25471157c69fa37ae6b276ff5ef4664

  • SHA256

    56d8aa82794138643a9ee8e6278834e4f1710f0f42e9830f30d0a21a19b1320c

  • SHA512

    17f9fc1713b7674e77f5467ff371a541f39c53e7dcfbea46992b5f651a2cddfa3c3c2cbbba55c141a26396fe8923974b838ccd178ea216e9f492df8f8337068b

  • SSDEEP

    3072:fXKKeWcNEzT5zvfpmGYoUyDpwPHHaFeo66bsDl8NLS:fXKK/cNcT5wDyDpCH6FL66bsDlyS

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.208

112.175.88.207

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ba5b02757abb9900da0ebf8be2828090_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\hongdo.exe
      "C:\Users\Admin\AppData\Local\Temp\hongdo.exe"
      2⤵
      • Executes dropped EXE
      PID:1656
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    ed5fb4240b0cd154c97f17af7109455d

    SHA1

    7ca7f753e40b8213ec950bff3b290c784a37a8cd

    SHA256

    058214bcd4b7fcc070af9a9ca3222a5df1f0e046037a3e9f516b6e158bac1d96

    SHA512

    1e51f8af2a8577aa6371c091efd2f3dff50c36aeb5d97d0375604e1087ccb0f69f309dbe2b31268b35c3f07490849959071ec4fa409b7e1f195f6a04bab266dc

  • C:\Users\Admin\AppData\Local\Temp\hongdo.exe

    Filesize

    205KB

    MD5

    455940a037d21bc6ce0131e1bc168acd

    SHA1

    b5a6f6c12d7562e9df46bce10f7f5c37b40a0f1a

    SHA256

    25c997305c72f7dfed1148dd31c11cd1cb9b796fe48babb76022609a6f561d00

    SHA512

    fc07260a76573decf826311f47f480e620744194a3520208cb5d6b7cd87e0c11b3eabf7e99b7ccfbfc87dafc3cc9f2bdbd6d6f195eb35c92474304d95859d0fd

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    290B

    MD5

    52a2d60be64ddd99597616edc045d9fd

    SHA1

    e0e2ee7356b204f2b174f6e02866361a7274508a

    SHA256

    8c802eac1b94b4969a8a398cd1cd8636e5bb7b170c00cdf28de8d36adcc2ddea

    SHA512

    d4b4e2913034587e771aebec10601fcf5cd9246a0dbbc97b2d7f3408d5475d00d5c7e4b2266884c3f32e23439d5cf020dcb60341dcecc86a597daf1f0cb8d11c

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    290B

    MD5

    52a2d60be64ddd99597616edc045d9fd

    SHA1

    e0e2ee7356b204f2b174f6e02866361a7274508a

    SHA256

    8c802eac1b94b4969a8a398cd1cd8636e5bb7b170c00cdf28de8d36adcc2ddea

    SHA512

    d4b4e2913034587e771aebec10601fcf5cd9246a0dbbc97b2d7f3408d5475d00d5c7e4b2266884c3f32e23439d5cf020dcb60341dcecc86a597daf1f0cb8d11c

  • \Users\Admin\AppData\Local\Temp\hongdo.exe

    Filesize

    205KB

    MD5

    455940a037d21bc6ce0131e1bc168acd

    SHA1

    b5a6f6c12d7562e9df46bce10f7f5c37b40a0f1a

    SHA256

    25c997305c72f7dfed1148dd31c11cd1cb9b796fe48babb76022609a6f561d00

    SHA512

    fc07260a76573decf826311f47f480e620744194a3520208cb5d6b7cd87e0c11b3eabf7e99b7ccfbfc87dafc3cc9f2bdbd6d6f195eb35c92474304d95859d0fd

  • memory/1656-9-0x0000000001110000-0x0000000001143000-memory.dmp

    Filesize

    204KB

  • memory/1656-20-0x0000000001110000-0x0000000001143000-memory.dmp

    Filesize

    204KB

  • memory/1656-21-0x0000000001110000-0x0000000001143000-memory.dmp

    Filesize

    204KB

  • memory/2380-0-0x0000000000320000-0x0000000000353000-memory.dmp

    Filesize

    204KB

  • memory/2380-17-0x0000000000320000-0x0000000000353000-memory.dmp

    Filesize

    204KB