Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2023 12:38

General

  • Target

    NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe

  • Size

    123KB

  • MD5

    d8c5dcba0144f9557cd411ef70f3b3c0

  • SHA1

    51bfb70c286193f604131e83e80031b3a4e22297

  • SHA256

    126ad942766d4aa10279c14c3ebe7b8911edb87542c83ea74f923583b068a112

  • SHA512

    d7717705c0389f6e5371c25f74b81bbffc3ef1df84fa4360bf6a623675de561a58c89fb56c3b52cedde8a22dd8a5267d223d5620c6234bd09daf79ba58077d17

  • SSDEEP

    1536:Ko6JdvxttIBcXISDPV2Mhg3GkFceersWjcd06UsfqW2vxq6Uw:iHC6D92O8n7eU06UsfUpqC

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.209

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d8c5dcba0144f9557cd411ef70f3b3c0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2172
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    123KB

    MD5

    1e61bff1253d118467406e44afb86cf9

    SHA1

    b954cf737fa60d8923663b8e764cc6fa2ab02cf8

    SHA256

    472db4ab27a459b36a43ac498ce593a90c04355a831c7016b8372840a48ed94d

    SHA512

    00307982bf5d27e743b05324cc2602ebf3ae4bd56884e4dbf49ef34b48b2738126f83910ac017466212ed9ee964866c13943b03d534d256dd60b41d40d033c94

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    d8b6fb23d659bed3f6b1cf40a104e95a

    SHA1

    07c9c74af6b0fe9b78bb1b3aed5bdc1e0b5de952

    SHA256

    f28d96334bf66f634f899c800b4d5c6195bcf407cb073761f8a4f30a4061f136

    SHA512

    e841cd9283c63a92395b4221492e2ae6b06d9c4108fcbbfe7d8a7928cfca405c14c0634a6388a4f18da3db611696ea797f9b825ed314d1640a17aa767593e412

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    284B

    MD5

    813b404a0a8befc17907e2845984a78e

    SHA1

    3005105e0371062e16092b41a4a83baa1499544f

    SHA256

    29c8cc06b22c1114aa0caf536d3746b5699b81362fa9b27701490e4ac0b9b4cc

    SHA512

    5b95e2d185825b327f5d0a211e2edf5ffca7438b5472032bf6c340dbb11364dcaf0fe406c965ffc7cbbe53045294aba391ff5b94c56afcb3b1f0a0ac1bce728d

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    284B

    MD5

    813b404a0a8befc17907e2845984a78e

    SHA1

    3005105e0371062e16092b41a4a83baa1499544f

    SHA256

    29c8cc06b22c1114aa0caf536d3746b5699b81362fa9b27701490e4ac0b9b4cc

    SHA512

    5b95e2d185825b327f5d0a211e2edf5ffca7438b5472032bf6c340dbb11364dcaf0fe406c965ffc7cbbe53045294aba391ff5b94c56afcb3b1f0a0ac1bce728d

  • \Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    123KB

    MD5

    1e61bff1253d118467406e44afb86cf9

    SHA1

    b954cf737fa60d8923663b8e764cc6fa2ab02cf8

    SHA256

    472db4ab27a459b36a43ac498ce593a90c04355a831c7016b8372840a48ed94d

    SHA512

    00307982bf5d27e743b05324cc2602ebf3ae4bd56884e4dbf49ef34b48b2738126f83910ac017466212ed9ee964866c13943b03d534d256dd60b41d40d033c94

  • memory/1464-0-0x00000000003A0000-0x00000000003C8000-memory.dmp

    Filesize

    160KB

  • memory/1464-6-0x0000000001F30000-0x0000000001F58000-memory.dmp

    Filesize

    160KB

  • memory/1464-18-0x00000000003A0000-0x00000000003C8000-memory.dmp

    Filesize

    160KB

  • memory/2172-11-0x0000000000020000-0x0000000000048000-memory.dmp

    Filesize

    160KB

  • memory/2172-21-0x0000000000020000-0x0000000000048000-memory.dmp

    Filesize

    160KB

  • memory/2172-22-0x0000000000020000-0x0000000000048000-memory.dmp

    Filesize

    160KB