Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 22:59

General

  • Target

    88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe

  • Size

    348KB

  • MD5

    4c4b66c6b066b8edb66c349622eafa64

  • SHA1

    a52526caa56039bd166e3b411d1e2cd91468a467

  • SHA256

    88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91

  • SHA512

    b2303535b7207ec167c8d3ebda7d010ac0346e73bfbf042cf916e3d07249e84bca4f5d1fc1cd056446ddbf601144cc000654712bbb837ec8f3eb130b73ff6d0f

  • SSDEEP

    6144:SaVKyyzwbnUkoiqwcAR92+TdO5CksxCDy9pPbzBHU2ytluF5:g7yUTihR3ONs46pP3BHUbtg

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.30.235

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe
    "C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\kadig.exe
      "C:\Users\Admin\AppData\Local\Temp\kadig.exe"
      2⤵
      • Executes dropped EXE
      PID:2428
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    113cdc98c8047fda62939eb3ad47f51c

    SHA1

    70751cc92e0601db54ed1a9aacb61afc3610d5f4

    SHA256

    2f96c0204a00a5f08f08fa25b35670633fb3a8a56f0ff58ee036de5c20678902

    SHA512

    989ae6cefb3b50b06ef8c6e004e1da56cacc637f0d2e2ca24bba9605d61659c1977a89dd26a115709155a5645dbfb28e05d2a3f21fde817a15bbf86876d24dde

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    766e808afaaa649d27667400d5c1f065

    SHA1

    c31f9e4b9e8e5a4840107f44d42cdaddb568a1b6

    SHA256

    69909994f90b457f255239b2b0e002b97ae5275c8d5324b60fe2a197581c49eb

    SHA512

    cab6551aba387713e4748515e5806692691b703eaf89a79ee13fb72fad450d38ff3eb5d58be182a593ef8307c86037c72d5275053cc86746f43fc5d171a02821

  • \Users\Admin\AppData\Local\Temp\kadig.exe

    Filesize

    348KB

    MD5

    0d46368e807bf1486d3fcd839e903fe2

    SHA1

    824027cc7e26c6665fb1455d950771cd095aed77

    SHA256

    dc28131977505aa3fd1d2a649ad73851b65a879992022d92b05a4714cec72bed

    SHA512

    561b2f21fd3044d8fc16170565ec4dc2775ae292f71c294cde37042d4c13b2a04d9df787bd42b73be60e41dc1101c8505377ea0e316eea2eebd8b5db588debb8

  • memory/2328-0-0x0000000001240000-0x0000000001301000-memory.dmp

    Filesize

    772KB

  • memory/2328-8-0x0000000002C00000-0x0000000002CC1000-memory.dmp

    Filesize

    772KB

  • memory/2328-16-0x0000000001240000-0x0000000001301000-memory.dmp

    Filesize

    772KB

  • memory/2428-18-0x0000000000B70000-0x0000000000C31000-memory.dmp

    Filesize

    772KB

  • memory/2428-21-0x0000000000B70000-0x0000000000C31000-memory.dmp

    Filesize

    772KB

  • memory/2428-30-0x0000000000B70000-0x0000000000C31000-memory.dmp

    Filesize

    772KB