Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 21:27

General

  • Target

    8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe

  • Size

    343KB

  • MD5

    39d3b86f9e8cf53ae91e37b591271ea2

  • SHA1

    163cfe040644500164b2ef914cef0d00ef1225e9

  • SHA256

    8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21

  • SHA512

    cdc41c741fe321571c06bff183db762f5b74ee06b6a00afeb1335d900c4a5fb8f052930a4c77500fe5328b912dfccd0f3a8a1fecdfd2b34862b98e1f90189f2f

  • SSDEEP

    6144:SF/gEKyOAuuHcqXt96bHa+bZu0k6XCCbd2CKcwA2x9G+84AmGSncH:SF/gVyduuHv946gZ6bCbd2qspnA6g

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.30.235

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Detects executables built or packed with MPress PE compressor 8 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe
    "C:\Users\Admin\AppData\Local\Temp\8b5af3bfd0e7ee1b5755679a196c7a651397e97e26a3eccdce31a74e310e0b21.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\yjulq.exe
      "C:\Users\Admin\AppData\Local\Temp\yjulq.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\wegeg.exe
        "C:\Users\Admin\AppData\Local\Temp\wegeg.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:792
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:1544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      340B

      MD5

      b0f9901cc65a6f7a0157f6e9ab2c56d4

      SHA1

      cb282e364211b9cd63bcff73a567863780e1833f

      SHA256

      b94d08c89c87f6e4fb50258c652cc9bea4d95e2cdb671cefcc0be28c00d924b5

      SHA512

      7b1fe66e76c67bc686e583d42b6a5cb8282d5ccc3f35a3668e34f4d7b7375a76e565ed2a855dc109371a0af3f38cb8176c0aee4bff302dc8bc2b61c00d616326

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      0f99e3548fb9557c6bb64a38956c807a

      SHA1

      f16f7f2be70391aed9c13294cedcdeaf3cfeb6d1

      SHA256

      5c6b8e0ac403dd93898c011d576279d034c0c6dbd9db8705774e905cc12fce03

      SHA512

      01746f7ed3334de57b30d8158652b8d4f0564b7f00469515de61bacf6151389c3f1fb0f07ec6281a0f66ebe61c8bc4078b2fa27ed4e994deb3b4c4f05e186a00

    • C:\Users\Admin\AppData\Local\Temp\wegeg.exe

      Filesize

      218KB

      MD5

      a7b5d8a06d41594be6048f25c450a048

      SHA1

      32752863b4f17bfe4f9d8b131c7d924e79aaaf89

      SHA256

      e4dae589c3de5a94da99e1e4f668a444be0a79af290655eab16b49a902d563c5

      SHA512

      60c2af813412254949862bcc2cbd4ff46ea3ce50355e28cfde6d3a784a4bf4e134f3ee70b0c0b0fb5c48892805dd7f088e09a00d4284e27874a54fa6209246e8

    • C:\Users\Admin\AppData\Local\Temp\yjulq.exe

      Filesize

      343KB

      MD5

      94ea5133606b1b9ba438bbfdaa54cfbc

      SHA1

      3e0443bf28b0895706744a10fb67f44464706621

      SHA256

      d31fc642f6bc82cc9359b724213b546b03b69f48c3d40157f726e0886d549aa3

      SHA512

      5da25d18113ca5c448ceebaccca9e57e294a207a1c6600f900ba276bb79fe5ebea2a15d15a9901fdbefbb27b7e90c786cfa3dadf333c569d92c66b9b137a56d6

    • memory/792-37-0x0000000000220000-0x00000000002DB000-memory.dmp

      Filesize

      748KB

    • memory/792-44-0x0000000000220000-0x00000000002DB000-memory.dmp

      Filesize

      748KB

    • memory/792-43-0x0000000000220000-0x00000000002DB000-memory.dmp

      Filesize

      748KB

    • memory/792-42-0x0000000000220000-0x00000000002DB000-memory.dmp

      Filesize

      748KB

    • memory/792-41-0x0000000000220000-0x00000000002DB000-memory.dmp

      Filesize

      748KB

    • memory/792-40-0x0000000000220000-0x00000000002DB000-memory.dmp

      Filesize

      748KB

    • memory/792-38-0x0000000000210000-0x0000000000212000-memory.dmp

      Filesize

      8KB

    • memory/1172-13-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/1172-32-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/1172-19-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/1172-15-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/2556-16-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/2556-0-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/2556-1-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB