Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2023, 11:03

General

  • Target

    0f85f187cb51b4b58c900a4d3a7f4326.exe

  • Size

    404KB

  • MD5

    0f85f187cb51b4b58c900a4d3a7f4326

  • SHA1

    41bea34a956d3442e5b68a9f06089a6d518d948b

  • SHA256

    4f17482d94907eac89accce9f0f6651c9229c9ef0572e1c22286dc93575458d4

  • SHA512

    13ddcc2ded8bdad36af3869386a381642dbac85ad06d34d0fae46ca92fd32b5da41fd6c4094bd46557216f6fbb65f9ce48af6f227685b7354a8e346b2f978196

  • SSDEEP

    6144:GzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInODgM:oU7M5ijWh0XOW4sEfeO8M

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f85f187cb51b4b58c900a4d3a7f4326.exe
    "C:\Users\Admin\AppData\Local\Temp\0f85f187cb51b4b58c900a4d3a7f4326.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5620
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:5428
      • C:\Users\Admin\AppData\Local\Temp\cyquh.exe
        "C:\Users\Admin\AppData\Local\Temp\cyquh.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5408
        • C:\Users\Admin\AppData\Local\Temp\kitai.exe
          "C:\Users\Admin\AppData\Local\Temp\kitai.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4076

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

            Filesize

            276B

            MD5

            3efa6da303a715f29745b5c3ad8899a4

            SHA1

            b8e86fed81b62480e2b1597983f1741fd748044c

            SHA256

            a7dff11314fc79d62aa3bd886680b3bdf95c66190019a650c9735c38360c7aac

            SHA512

            b3449237fa7023a320e72bf4acd7e99a10cd1502ae782476eb6f4aa83abf74d83b35c11802fbed5302bfce65ffba27ee9656a7a52bf2264b28b699f4c9641aa6

          • C:\Users\Admin\AppData\Local\Temp\cyquh.exe

            Filesize

            404KB

            MD5

            cb4f8840124a80e64c845959148d0beb

            SHA1

            90d974a9b6562c71e11a35bf22319839f5b7725c

            SHA256

            6093aa04814a758512679479b72d000362227924d97487fbf7d35ad070b11e64

            SHA512

            e6bb6fd5124e86f7d174d98fa24d7ccd7ff95cdcb1d130cf831dea82834b38dc38cf5accf740579d5a00c7f2c31c495799be15f48da74f466f1527ddf4d47cd1

          • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

            Filesize

            512B

            MD5

            ce340c970809c20a71fe3697f0feb24b

            SHA1

            4cc723fd454d9c36ed654fe90754a03ac526d60b

            SHA256

            3bfb50ed77c4b6eef42de59d8577c2eb7c85a3ca54c58cffa908c054eeccaffe

            SHA512

            157a061ad80cce4a171c32f865d97f6a9ffd974326b078c0a09e0a613ebb76b4ce09b35d168c43d643cde03799a7a2e1927c2a2109011eed1419d855a9e82c37

          • C:\Users\Admin\AppData\Local\Temp\kitai.exe

            Filesize

            212KB

            MD5

            d6d15ffe3f1045c14d7d5c599de042ef

            SHA1

            5beda7031c4f82bd220eed9cf08bc259284020a0

            SHA256

            12d8bc187789e52307e98014c8f4212be04a37e1eb93c005fa349e1df61a89f7

            SHA512

            bb10197f69cf86ed6b2d08b6645c88164fa71901ed3c445e99b0a9018bd79037913003e1c876cdafba545f605d8f18e419772b28644f99dbfbf5c042a5cef328

          • memory/4076-31-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-25-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-26-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-29-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-27-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-32-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-33-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-34-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/4076-35-0x00000000009D0000-0x0000000000A64000-memory.dmp

            Filesize

            592KB

          • memory/5408-12-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB

          • memory/5408-28-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB

          • memory/5620-14-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB

          • memory/5620-0-0x0000000000400000-0x0000000000465000-memory.dmp

            Filesize

            404KB