Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-03-2024 01:35

General

  • Target

    e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe

  • Size

    344KB

  • MD5

    e90fbfc35090355aec173d79341b7b8c

  • SHA1

    6de2e18af5013c1236f691d03fe739471126a42e

  • SHA256

    e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791

  • SHA512

    c9fdc21fc07ea8272cfa9555316d91df9fab5d226f5c696b78d4cb4461df8ab4b35a01da0d3ca46ce229e945bb33ae23f1c7fb39c4ba1764af50d70915623610

  • SSDEEP

    6144:DX+psoWJ+IvLI7BziS3qoJGd2GexPZmxMcVp0XpY:ymoWkI094og2GgPZkiC

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe
    "C:\Users\Admin\AppData\Local\Temp\e518625844848805ddf2dae9479ccdfdf6013084b68910cd004954aa81e30791.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\vehol.exe
      "C:\Users\Admin\AppData\Local\Temp\vehol.exe"
      2⤵
      • Executes dropped EXE
      PID:1236
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:1852

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      340B

      MD5

      bb58049e335fa69e3e5ad91fdb5170bd

      SHA1

      580f55735f98c128eb0eb95968e00b92a4f6267b

      SHA256

      882ad1d47647dbd566bc502b07b00ede2382b9494c1616164b8ab67e7620af7b

      SHA512

      80ba5f3064b717868d72be7388f8d7779351123894168b3af9a4baa65a9909eecb68c732a9b4d0a09f68498e600c1cbae01603de189a64f97072f2ca70ac3a2a

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      80130d89b4673329154dfd41724d65bd

      SHA1

      151c947a6275da29ce8d37a9bb12e52c25f39822

      SHA256

      4fe24076b28e2da31189b7603ed28feab78dde66ffa64ee63a5df248f0866de9

      SHA512

      9814069192e8510b70618cbf9ced7f15a76f6f97cf3e9474e316715db749c497878298a9ae5800b5fe215e79cebc62c62ede2be4b10e20aa719026f2fc2ab3b3

    • C:\Users\Admin\AppData\Local\Temp\vehol.exe

      Filesize

      344KB

      MD5

      b13ac26d39be6878376856c0176e793e

      SHA1

      94e655046cd886c35688d1596d968a367f5dc842

      SHA256

      aeff41d8c1c4a050974c11f9353f388d5c0f0035d7f2927ece399c4223d50ec8

      SHA512

      e19c25624d075aa799aa90f069f2831dd8f015defa318b649e9f72437d8932b096377321df219bfbb89d48fea8431ac01dbc1bd3ebf5fb55fd4467d5e72a2c2e

    • memory/1236-11-0x0000000000FC0000-0x000000000108C000-memory.dmp

      Filesize

      816KB

    • memory/1236-17-0x0000000000FC0000-0x000000000108C000-memory.dmp

      Filesize

      816KB

    • memory/4392-0-0x0000000000F80000-0x000000000104C000-memory.dmp

      Filesize

      816KB

    • memory/4392-14-0x0000000000F80000-0x000000000104C000-memory.dmp

      Filesize

      816KB