Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2023 22:43

General

  • Target

    NEAS.d03af095074486e27cff72e93bbcfb30.exe

  • Size

    166KB

  • MD5

    d03af095074486e27cff72e93bbcfb30

  • SHA1

    94e04ca9a5da0ae09cb8702e6a46640f53e3d290

  • SHA256

    d62f7cc25b27ab6220740f062e147be5bb78d0762d80f0aef60bc5f91403b9f1

  • SHA512

    5cff95c8d18a33e2aa04edbfa035c1d2ad656b06d95536b8f88a47940300b7ee956f01fba13fdfd322d4d8c57323dad087042217ee8071efbe2910b3bf01a139

  • SSDEEP

    1536:eADO0Wbt1931D2P7BWLQ4zR4LUKMcPHFE3HP/GTW65CGEEHpWYPyI:eADO0Wc7UJ6LZMaHLW65DE8pWM5

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.208

112.175.88.207

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d03af095074486e27cff72e93bbcfb30.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d03af095074486e27cff72e93bbcfb30.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      PID:2060
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    5e704b5f881109f8bbed7ad82da7d387

    SHA1

    b2d1b752096acb6d34dec98309bef7d6d2a4ffd0

    SHA256

    cd008a2663d30d350f996ca092703616ef5500c0df20b1798ac99589a5c6964e

    SHA512

    8bc14bef2e186dc2106326a220fc88a00499f96750ff953b81944a058d75b99e8ca48fa327ff490ffa9cbf790f6d613c7804ec27cac8880a3dc4d9f177dd80cd

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    166KB

    MD5

    c1991bb61d047f3bf9b35cae302d6657

    SHA1

    d911962125b91bdcb1da1ff0233691fbaa596b9e

    SHA256

    901cf497707b5457640d34af953d9b52f8dd132b75b0ccaefd38f3985bdb36de

    SHA512

    941b40035612c7fbbf32675fd09e371c91208b053e6ab454356d817308a2c303d018f4646c88ca2f8a51139633484da07993f7cb2e7c4fd6bc5174864d853fad

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    284B

    MD5

    a374a32f17e029ac79b8ea191b5d40ac

    SHA1

    0aab73982315ee553d3210d330306ed1fce29b93

    SHA256

    b970d3dd2ab52e512e1a76c224424f32c8f175fa25fe2e8eeba5b7733b8a8225

    SHA512

    2ecbd39347fb4d5ff01ac186ec3ffccb7e198b930e6f9d8e753a6225bff1cc9aba06f2dcf1bde98da21e2b2fa12013a3a28a46adfec464b6cea7a6ee232a2572

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    284B

    MD5

    a374a32f17e029ac79b8ea191b5d40ac

    SHA1

    0aab73982315ee553d3210d330306ed1fce29b93

    SHA256

    b970d3dd2ab52e512e1a76c224424f32c8f175fa25fe2e8eeba5b7733b8a8225

    SHA512

    2ecbd39347fb4d5ff01ac186ec3ffccb7e198b930e6f9d8e753a6225bff1cc9aba06f2dcf1bde98da21e2b2fa12013a3a28a46adfec464b6cea7a6ee232a2572

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    166KB

    MD5

    c1991bb61d047f3bf9b35cae302d6657

    SHA1

    d911962125b91bdcb1da1ff0233691fbaa596b9e

    SHA256

    901cf497707b5457640d34af953d9b52f8dd132b75b0ccaefd38f3985bdb36de

    SHA512

    941b40035612c7fbbf32675fd09e371c91208b053e6ab454356d817308a2c303d018f4646c88ca2f8a51139633484da07993f7cb2e7c4fd6bc5174864d853fad

  • memory/2060-10-0x0000000000130000-0x0000000000161000-memory.dmp

    Filesize

    196KB

  • memory/2060-21-0x0000000000130000-0x0000000000161000-memory.dmp

    Filesize

    196KB

  • memory/2060-22-0x0000000000130000-0x0000000000161000-memory.dmp

    Filesize

    196KB

  • memory/2136-0-0x0000000000150000-0x0000000000181000-memory.dmp

    Filesize

    196KB

  • memory/2136-6-0x0000000002040000-0x0000000002071000-memory.dmp

    Filesize

    196KB

  • memory/2136-18-0x0000000000150000-0x0000000000181000-memory.dmp

    Filesize

    196KB