Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-04-2024 03:15

General

  • Target

    d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe

  • Size

    234KB

  • MD5

    e0b44d97a6ad7f788e6d23ebcdd0b4a6

  • SHA1

    e1cfab504d60b9d43c176b7ceb4ce977f8673025

  • SHA256

    d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50

  • SHA512

    f29bc9dfffdbdc0c95cefe52dca52f513f403faa85e37f1e6cb2b52718e60a115aa2500d1c5514da93da0f588bac3f7af38e4f8b10f3203268c74479c41530ac

  • SSDEEP

    3072:Adrb8W+tGKqLDphy9q65kOVp4lwlq1/9l53GdeItG+XNcX1Mg:A1QW+tGFLVRXOVuwlqpAN4lMg

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe
    "C:\Users\Admin\AppData\Local\Temp\d5911d52b274c81999acea9ca76c22c065e3a530da6d0e5fceb283cb1bc22b50.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      PID:2468
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    38df3cee9628e806ae028a55840b216e

    SHA1

    bd1faa7e39dbf5f8d7a8749e81a45edb29998d2d

    SHA256

    778e377beba133790823de61cffba536573321eb8c2a432f570647af685a868a

    SHA512

    d6648c439438bcb9e0080bd5a07483d4b05d5e81d69b09b5eb46e6422fc8b86c08fc5f5e9d169d54f26becacfdc43ef4609c22aa9b3dc19b472a8368c0913feb

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    e4e71c45bcdc238b4c50e93ccbd33a60

    SHA1

    f850d279115f8a24e538468704dfe72378d4fb79

    SHA256

    55c3cb49b676c4d0013f35fa92819afdb5b714053b1a572e1c9143a7ca914f40

    SHA512

    374e5d256f0345dedc2be45b61424c1185997fc5a80d02887248555a3ad705afbbf2f5a4c57844253931e9ac5ff0f5c6bf1b934f1cb66c5c43a35132dfd85973

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    234KB

    MD5

    3813645d3d483c1eb08758b92a9f2128

    SHA1

    be9d650f3be89cf9a5d1dfb7364a7fa90bd1cb84

    SHA256

    4ae26fa0ee604b3d8aa253a4a3f486f2e44a8a6350d1f0daa0508a7e29cc2506

    SHA512

    f60e594893f0ba4f725163f2192b0fa0b2a67fed7291491bcb25c3489f35e7f47d0162deb8e6718efe9a9ff37b448df7db66bbf727045d70ec8136f7df61f366

  • memory/1692-0-0x0000000000150000-0x000000000018D000-memory.dmp

    Filesize

    244KB

  • memory/1692-9-0x0000000001DF0000-0x0000000001E2D000-memory.dmp

    Filesize

    244KB

  • memory/1692-18-0x0000000000150000-0x000000000018D000-memory.dmp

    Filesize

    244KB

  • memory/2468-11-0x0000000000C30000-0x0000000000C6D000-memory.dmp

    Filesize

    244KB

  • memory/2468-21-0x0000000000C30000-0x0000000000C6D000-memory.dmp

    Filesize

    244KB

  • memory/2468-22-0x0000000000C30000-0x0000000000C6D000-memory.dmp

    Filesize

    244KB