Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 19:25

General

  • Target

    3c84aa3f8f46669648f51b150afe8494.exe

  • Size

    487KB

  • MD5

    3c84aa3f8f46669648f51b150afe8494

  • SHA1

    c073c74728a82c76246ca285f7f136a4615a0518

  • SHA256

    f0f21e5facff46ddd12b0062afd60e748c017cf2e701b6aacda1b80dc045b921

  • SHA512

    a5b5afa48ce1234881d2ab3d9d819303b4f54470b5abaca51854a437cac3bb4f70e32feaba95c6ba3dafddef35b3e8daa3b8d70efe8507d484485e1606da76af

  • SSDEEP

    12288:cpbfVlu0agWfZlnxgmEpZGsrUs99uDEq5EGDFhH:cpbGRZxSfGCUs99hq5Jf

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c84aa3f8f46669648f51b150afe8494.exe
    "C:\Users\Admin\AppData\Local\Temp\3c84aa3f8f46669648f51b150afe8494.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\muyju.exe
      "C:\Users\Admin\AppData\Local\Temp\muyju.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Users\Admin\AppData\Local\Temp\opden.exe
        "C:\Users\Admin\AppData\Local\Temp\opden.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4768
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:3312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      276B

      MD5

      857ffe3a149b4e207542754d4db81285

      SHA1

      345193fb480d2baeba2455414be80685354f7e51

      SHA256

      4b76eb2d49730cb70c6eaf5389846dfa7f04f8bf88d54ae6537ad6204dec5ca8

      SHA512

      1cab78a9dc14d53f520a404f33b2c4f5d8aa49e1e3ddba23ee8afdb6ba783c8e1c53f225197fa27c50a7b6f67f63602b3ed0ff459230fb5bbeab3313cb3c9d51

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      7386cd9472dac65253a451aab3c69b2e

      SHA1

      2bb7ff31b6f08addc50e31580f25dc3cbb07492c

      SHA256

      6124fab5ae384514ee72bfa57adf161813e625ccba41b5ec2203ef2443db0fe5

      SHA512

      07de158b87bee7f495300a774e0fd18831047eb54ca018bf351463225e2f951e0b45390c4d1cd02e50a60e92cb89233e4b4d0c7eb75c3266beee2db2906bd7e0

    • C:\Users\Admin\AppData\Local\Temp\muyju.exe

      Filesize

      487KB

      MD5

      1140a66d409353fb56a46fc45ef5d636

      SHA1

      cab48e22b0ccead19b7c164cc60d6ea4dccf5351

      SHA256

      f54da541d09358c0efd875f18a233b1ecfe649a52c2885bbb5b0c8caac740080

      SHA512

      cd07773a91a3dc79e68aa34550814d25beaf2bb9f6e11d2eeebfc950e0e2c06f567cbdb2cfa19bca69ab77cb7f3634c5cd0a5e174d95ab49ed3970d3084e2cf9

    • C:\Users\Admin\AppData\Local\Temp\opden.exe

      Filesize

      178KB

      MD5

      3db74541a359f0fc4df46103aea56338

      SHA1

      21ab5fd7790fd327689ba8a2a396ac2b1bccb919

      SHA256

      21b211575fe32ca0f7647f0ef91794ebe18905d3461752d37c63761655523893

      SHA512

      d307faa7739a1001a74c9c2f618c3793d45545752ee129bcedbe45867d040c8a992112e77757ac01c2847625fc9a695145444adc23e108a0c57ea795b8053d2b

    • memory/316-0-0x00000000000B0000-0x0000000000136000-memory.dmp

      Filesize

      536KB

    • memory/316-14-0x00000000000B0000-0x0000000000136000-memory.dmp

      Filesize

      536KB

    • memory/4204-17-0x0000000000650000-0x00000000006D6000-memory.dmp

      Filesize

      536KB

    • memory/4204-12-0x0000000000650000-0x00000000006D6000-memory.dmp

      Filesize

      536KB

    • memory/4204-27-0x0000000000650000-0x00000000006D6000-memory.dmp

      Filesize

      536KB

    • memory/4768-26-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/4768-29-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/4768-30-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/4768-31-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/4768-32-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/4768-33-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB