Analysis

  • max time kernel
    93s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 22:59

General

  • Target

    88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe

  • Size

    348KB

  • MD5

    4c4b66c6b066b8edb66c349622eafa64

  • SHA1

    a52526caa56039bd166e3b411d1e2cd91468a467

  • SHA256

    88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91

  • SHA512

    b2303535b7207ec167c8d3ebda7d010ac0346e73bfbf042cf916e3d07249e84bca4f5d1fc1cd056446ddbf601144cc000654712bbb837ec8f3eb130b73ff6d0f

  • SSDEEP

    6144:SaVKyyzwbnUkoiqwcAR92+TdO5CksxCDy9pPbzBHU2ytluF5:g7yUTihR3ONs46pP3BHUbtg

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.30.235

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe
    "C:\Users\Admin\AppData\Local\Temp\88fb75467125061c4c87a725c9370766a030e2d9fa784ec196d4124dd4badf91.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:6124
    • C:\Users\Admin\AppData\Local\Temp\lyitb.exe
      "C:\Users\Admin\AppData\Local\Temp\lyitb.exe"
      2⤵
      • Executes dropped EXE
      PID:4768
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:2172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      340B

      MD5

      113cdc98c8047fda62939eb3ad47f51c

      SHA1

      70751cc92e0601db54ed1a9aacb61afc3610d5f4

      SHA256

      2f96c0204a00a5f08f08fa25b35670633fb3a8a56f0ff58ee036de5c20678902

      SHA512

      989ae6cefb3b50b06ef8c6e004e1da56cacc637f0d2e2ca24bba9605d61659c1977a89dd26a115709155a5645dbfb28e05d2a3f21fde817a15bbf86876d24dde

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      6a56cb61dd7c9b3cd432a57e1bf2777a

      SHA1

      0237470a40007332703425f5b964520f2cfd2994

      SHA256

      718b67ed2b4b2568eb9049beb8db42a8695ad29c72b721cf25bdbb6bd755168d

      SHA512

      f5a795dd77dd1b5e74b850903b642aa0990f0b7474563d5e1d46561a58c3326a616e2cb1759a63bfff3da82e79c0dd8f2806e000075c014ce9ec646eef959ab5

    • C:\Users\Admin\AppData\Local\Temp\lyitb.exe

      Filesize

      348KB

      MD5

      845bd798ac3b8c726dd60470714eba29

      SHA1

      bbdc3d0c4f3bbc8740caa8c8239610b00771cebe

      SHA256

      d4800dd40ed47dd59f3471c706b60051b6e9bcfd521842fc65ae1ede1a835f49

      SHA512

      19a29b9eda82b18c357426d7b3bcb8918f4d1e697fdbf5b5b52489f4eb3241b0324d74784984abba7e0fa4e6d2a3988f8cc54433eb826ded210b7f52ccb09978

    • memory/4768-12-0x00000000000F0000-0x00000000001B1000-memory.dmp

      Filesize

      772KB

    • memory/4768-17-0x00000000000F0000-0x00000000001B1000-memory.dmp

      Filesize

      772KB

    • memory/4768-25-0x00000000000F0000-0x00000000001B1000-memory.dmp

      Filesize

      772KB

    • memory/6124-0-0x0000000000BB0000-0x0000000000C71000-memory.dmp

      Filesize

      772KB

    • memory/6124-14-0x0000000000BB0000-0x0000000000C71000-memory.dmp

      Filesize

      772KB