Analysis

  • max time kernel
    169s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 08:24

General

  • Target

    1355682569550edcb370e7a820c0448a.exe

  • Size

    556KB

  • MD5

    1355682569550edcb370e7a820c0448a

  • SHA1

    57010eac58e38033f1ce9b5757af6bcfc801f602

  • SHA256

    6ca088dbaacae332620f3f87e1aae62862ac51413e1d5f642a2e1aa968b4de1f

  • SHA512

    1df2a9f417a4445dc73bf90cbff349436b50763ec56f122678aeabda1283fd7c8b4f7a82970c092a81ef110d751ae7c13213519e00b6e3b88bfa5e3dc5f16072

  • SSDEEP

    12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEyD:znPfQp9L3olqFD

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1355682569550edcb370e7a820c0448a.exe
    "C:\Users\Admin\AppData\Local\Temp\1355682569550edcb370e7a820c0448a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\joavf.exe
      "C:\Users\Admin\AppData\Local\Temp\joavf.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\quhoz.exe
        "C:\Users\Admin\AppData\Local\Temp\quhoz.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3936
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:4140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      276B

      MD5

      a1f2d63bf7e6171e5e3bb0341ecb8803

      SHA1

      d45789e3b9398d1018337bda0c7d66865510b2e3

      SHA256

      bda25b5a4eb75538ee425c7070e920e6f169aab05d07bec8e94051e45d475b53

      SHA512

      ca76ee81b2bacb08baac7c12a7005225b279cd0a89ff5f2050cb9e12b05946d7552921df518714397c401e5b7a1d0525dc8ea4bc3014fad2df188132196989a0

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      81a95f8d013159312e045e489857f50b

      SHA1

      b6219e168abc8ac96bd712754ad93ba1dc44b1d5

      SHA256

      d22e0b6454d997fdda795292590fbcf08e4dd83fd54bfad29392fb19fa71384f

      SHA512

      429c7c8740599e11ef486d73e90be2de545fccb7d98daaf91c464b5c8da271cb5b109a5a127c4b32f7756adff7d720a3dd897b68aa5bb2985a23a0dfb62f1c93

    • C:\Users\Admin\AppData\Local\Temp\joavf.exe

      Filesize

      556KB

      MD5

      fb08481a3ab0d96dcad94d1903334380

      SHA1

      5b7fa2c3b519f5fbb236fce67a3a7770abad1bca

      SHA256

      13d096d105f853056c7d8e87f00bd01c9caa8a7e81b41f4a772eb95a1c58d0d9

      SHA512

      77e727e58426959e45c9509316a0b1a656a3fea9711326814ee04cca1c03a2bea26979d5ea49f10e9aff1a512eb7248cba548ed836b456721acf8a36d2b97342

    • C:\Users\Admin\AppData\Local\Temp\quhoz.exe

      Filesize

      194KB

      MD5

      b10728d0fb927edbb2cddac5557f61de

      SHA1

      0784a95397f940873bef0507e48e0df6bd14b880

      SHA256

      66c2231aa39d31b35ef5a9dcc440a2bff671a0889f20dd696d710bbac8051fcb

      SHA512

      b660f2224efe6c74897c098b3e81348887fb26ba058969b99129fd0c41b4df964275c7a7051567c94441134fa124e3c86026d3525a461f8d4812010b6e32e008

    • C:\Users\Admin\AppData\Local\Temp\quhoz.exe

      Filesize

      188KB

      MD5

      cafd8405d3c9930ff22817084373f6f3

      SHA1

      358016a87c8a4aa3d0d7d19430d085f2bf58e162

      SHA256

      890d9b17649f30360fa5107a2d5a3f45c2dedaac1953a1fc68b305ab52f218ac

      SHA512

      4e2559bbf6e700fd3c39f2f68b60ae50ac7205f1cf76686a02fd90be5c40718b84bd9a11a7b3697dec404200867dfebd7f6bae02d83ae4a090aeb8b44945eea4

    • memory/1764-14-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/1764-0-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/3936-26-0x0000000000400000-0x0000000000494000-memory.dmp

      Filesize

      592KB

    • memory/3936-27-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/3936-30-0x0000000000400000-0x0000000000494000-memory.dmp

      Filesize

      592KB

    • memory/3936-31-0x0000000000400000-0x0000000000494000-memory.dmp

      Filesize

      592KB

    • memory/3936-32-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/3936-33-0x0000000000400000-0x0000000000494000-memory.dmp

      Filesize

      592KB

    • memory/3936-34-0x0000000000400000-0x0000000000494000-memory.dmp

      Filesize

      592KB

    • memory/4436-17-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/4436-12-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/4436-28-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB