Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 23:08

General

  • Target

    6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe

  • Size

    366KB

  • MD5

    8d485f83022e4be758176248bb551a09

  • SHA1

    a75b23f6102cf0b4ba71590ec1da7f72421d74e4

  • SHA256

    6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619

  • SHA512

    80c45c3eb593ceb284fa513245ffb5c0d5a971795250552d0f1b24959fba1cf5943f7843421b69f945367578db175af1fbd4b74dba7c73d93065288ee76edbfa

  • SSDEEP

    6144:1o3whi+1Py3V0a24kOn+Sr72iyjmhuKtUYiw52hVOcvBRMHkWYHpo:YKf1PyKa2anKjm3OYZ2hocvHK

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe
    "C:\Users\Admin\AppData\Local\Temp\6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\Local\Temp\zikeh.exe
      "C:\Users\Admin\AppData\Local\Temp\zikeh.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4112
      • C:\Users\Admin\AppData\Local\Temp\tozuz.exe
        "C:\Users\Admin\AppData\Local\Temp\tozuz.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4204
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:1928

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

            Filesize

            340B

            MD5

            319ae29c1070879d12f867d45e6607ce

            SHA1

            04df641032207345c0be275ccef5280af41c5fb2

            SHA256

            a15e8bb02ae31b4f3100a4101fed0f21ec28ab4e8e753902193fb3666c3dd317

            SHA512

            a09116eb0cdc528c98efb29a4c86aa40ffe4a3f1ba5279de36a967246dde08b80a0704674e3d4ce0ee90b0c0483ed85afb5786108230a989f04f072b156f2732

          • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

            Filesize

            512B

            MD5

            7c3375aa639eb5957f2b873f79679af3

            SHA1

            9b583eb0e18b67e520d2915425b46c108e4d7847

            SHA256

            64cb4cd628eb6d33ae3214390e35767fbc902f1007512b2c6e574a72ac8d96a4

            SHA512

            3ead7f543766e906d0de1db6c51f0487b1ea75eb295f91fd96c0d7ab9ef5cc3a9e3fe8947d3263d4a1867ba0baadb52eae34d5ecfbb353363baef31de84c707f

          • C:\Users\Admin\AppData\Local\Temp\tozuz.exe

            Filesize

            208KB

            MD5

            4f59711ba07b3a0bd4bc33adf391065f

            SHA1

            73080f5260900c6e16dbc513e7207c1ba0ed7ef0

            SHA256

            1bb1e2e923fedb746d4c3b73f5d520c898bc090d6341eeba723e9cdb24f46064

            SHA512

            c81721e372614bc3c68243ff6eadfa2b8cce32e43067ac8cfe3bc982612eb200f870b637c9f6ddeab6c2859d1d6cdb5945e3cfb67c0116cb6dc386153886dff0

          • C:\Users\Admin\AppData\Local\Temp\zikeh.exe

            Filesize

            366KB

            MD5

            7e2d42ad6f320fb64b7eecfaec2ebf46

            SHA1

            1e8dfee4b4967f65f3fb3aa6197c16519a4f72e7

            SHA256

            73639b9a501916032c4c39d8b6b1bcc8d59df71398e269d005216c0f1c49cdf4

            SHA512

            1e401df65cb94a486a3b0b9e0b2daaf86fc75ff9557185cc037a6c4bfef8e2325535b47c5c2ffdb7aa4415a14b3b6b98c7d514d5b6f3c47ab8c0600ed020c704

          • memory/3332-1-0x00000000007C0000-0x0000000000822000-memory.dmp

            Filesize

            392KB

          • memory/3332-0-0x00000000007C0000-0x0000000000822000-memory.dmp

            Filesize

            392KB

          • memory/3332-16-0x00000000007C0000-0x0000000000822000-memory.dmp

            Filesize

            392KB

          • memory/4112-12-0x0000000000860000-0x00000000008C2000-memory.dmp

            Filesize

            392KB

          • memory/4112-19-0x0000000000860000-0x00000000008C2000-memory.dmp

            Filesize

            392KB

          • memory/4112-30-0x0000000000860000-0x00000000008C2000-memory.dmp

            Filesize

            392KB

          • memory/4112-13-0x0000000000860000-0x00000000008C2000-memory.dmp

            Filesize

            392KB

          • memory/4204-29-0x0000000000DD0000-0x0000000000DD2000-memory.dmp

            Filesize

            8KB

          • memory/4204-28-0x0000000000A30000-0x0000000000AE3000-memory.dmp

            Filesize

            716KB

          • memory/4204-32-0x0000000000A30000-0x0000000000AE3000-memory.dmp

            Filesize

            716KB

          • memory/4204-33-0x0000000000A30000-0x0000000000AE3000-memory.dmp

            Filesize

            716KB

          • memory/4204-34-0x0000000000A30000-0x0000000000AE3000-memory.dmp

            Filesize

            716KB

          • memory/4204-35-0x0000000000A30000-0x0000000000AE3000-memory.dmp

            Filesize

            716KB

          • memory/4204-36-0x0000000000A30000-0x0000000000AE3000-memory.dmp

            Filesize

            716KB