Analysis

  • max time kernel
    184s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 08:33

General

  • Target

    NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe

  • Size

    289KB

  • MD5

    00e88e3ce274240256760a7ac9ebe8b0

  • SHA1

    4ec2b317a7e5eedd1ca6b7b99db52ed4863bd65a

  • SHA256

    4221a10ee79d1507ee5152a9eddad6430f7de57e9746e85a93f89cbea91ac36f

  • SHA512

    29f24ad9d2798218f6f861426a74d03ecdd60050d7df971916dfae9d0f86529c71b4ce8346dbce8aa584de1f4bcb0e17fecdc1430e34f1b53d444c98be745307

  • SSDEEP

    6144:vgE7TPeAJSCvJmquWT52nhojpJj+mKuGoS7zvR:vRPeaJmXWF2nhwph+mYoSJ

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.30.235

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.00e88e3ce274240256760a7ac9ebe8b0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\nudoh.exe
      "C:\Users\Admin\AppData\Local\Temp\nudoh.exe"
      2⤵
      • Executes dropped EXE
      PID:5100
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:3424

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      286B

      MD5

      285e1d4e6454338bc6ad551e71f7bfee

      SHA1

      506df8f9b62905f09fd4cba441ee3951d286558b

      SHA256

      ada7a454584f8da873f52da47b48d07d1aa5c82640783f844802c9eee5047987

      SHA512

      e27386f5de510409df46c2daa7cc79f984a63fed3292979e745c26fd9b1055f8c4eda66b3d070103a942124b06dc3170f237ebe2eac22936477eb14da825ce5e

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      532708613e7d8c34dde8d934a919e44b

      SHA1

      b4c0e4f5949e3ff448bb187462abfa9074c92dd5

      SHA256

      5c3e7c53fa7f08d99bc7afc4de08da75ca9d5577f48f74bb7f6d7fc163a7596f

      SHA512

      bd14f06082795fd1a6a11f24654bd907c83371d1ef5a57ee3ca4a3ee99b44c18fb494e7d04a0b6eb198f5c8d9842e96c38e0c694bd49ce77453324a90b957a48

    • C:\Users\Admin\AppData\Local\Temp\nudoh.exe

      Filesize

      289KB

      MD5

      2680f8f8987c5108220e4774028a35ab

      SHA1

      001cd1291b75bbb804634bbab3c03bf8c907aa6d

      SHA256

      7bd541ee325fbbd1c06270c6e233bcc36cfe3d03c2cf2dab8bc16ba631247ae9

      SHA512

      202f6c18e1b2600e4accbf02af65020fdc7c17f924242772229c62316997d82cafcc5d8c42f55b7b3a64bbf019b6d1cd9c5222d0f8153b222c1c94eb8ca6a341

    • C:\Users\Admin\AppData\Local\Temp\nudoh.exe

      Filesize

      289KB

      MD5

      2680f8f8987c5108220e4774028a35ab

      SHA1

      001cd1291b75bbb804634bbab3c03bf8c907aa6d

      SHA256

      7bd541ee325fbbd1c06270c6e233bcc36cfe3d03c2cf2dab8bc16ba631247ae9

      SHA512

      202f6c18e1b2600e4accbf02af65020fdc7c17f924242772229c62316997d82cafcc5d8c42f55b7b3a64bbf019b6d1cd9c5222d0f8153b222c1c94eb8ca6a341

    • C:\Users\Admin\AppData\Local\Temp\nudoh.exe

      Filesize

      289KB

      MD5

      2680f8f8987c5108220e4774028a35ab

      SHA1

      001cd1291b75bbb804634bbab3c03bf8c907aa6d

      SHA256

      7bd541ee325fbbd1c06270c6e233bcc36cfe3d03c2cf2dab8bc16ba631247ae9

      SHA512

      202f6c18e1b2600e4accbf02af65020fdc7c17f924242772229c62316997d82cafcc5d8c42f55b7b3a64bbf019b6d1cd9c5222d0f8153b222c1c94eb8ca6a341

    • memory/1828-0-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/1828-3-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/1828-16-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/5100-13-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/5100-19-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/5100-20-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/5100-22-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB