Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 03:00

General

  • Target

    a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe

  • Size

    55KB

  • MD5

    a495b30ea6e8f8d53ac6a02405931025

  • SHA1

    6335bbe44c4924519cb58f345add3afcd801f4af

  • SHA256

    a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38

  • SHA512

    31832b86adb1b465688ab7a2ecc25136b77709c839643c2d793afcad999eac7581734acfc020c37ebed547897c312a61f2adef83b9c125a6dd7b97c551fc0de4

  • SSDEEP

    1536:vMcQYte55zs091Zw9FAGDdJYipvwGf9ogjrgH1:vMhAe5Zs091KI+JYixw49XjrE

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe
    "C:\Users\Admin\AppData\Local\Temp\a3f6052e029a9b1e1b51db79983bbcc70d2cb8cb1ac72d7ad2fb4932dd08fe38.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      PID:3068
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:3992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

      Filesize

      55KB

      MD5

      7408017bf69aff3523679e496bfe08db

      SHA1

      7af91496a5e6bd67bf2a61b16293fb765352bd20

      SHA256

      174be4765367a188a65520dd468442443d87a92970d7cf7b2f8f629284b1060c

      SHA512

      075c93fa0598208d1fed5ad9d2e157070c396d86c6e747d1036ca0f42a6bda519e342ad8247b21e3d14389d3418d959f22aa4cd9d4018ed1aa1979912b54fff3

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      b4a86880004da8726288d7ec954885a8

      SHA1

      1bab1cfbdc2c540246210bc7852f8fe7e8357b31

      SHA256

      c85016a9115aeb492bf116ab05791a9c3e6e30c39274767bd0476bd56a37db46

      SHA512

      22758f6c6de591c99f8f9857c1b03e55c242f0a4987d376b08c30bc608027d1574a228a8230099ddac2a3214663396b016e85d085204155a5ec26f87a28496b4

    • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

      Filesize

      338B

      MD5

      e833c5878fb4dc294ec836412b5b55aa

      SHA1

      ae826a28633b5e40c68c2d25a88c08b2a1e7e661

      SHA256

      7ebaba01a17b2cecfd403de666a8230367debc28a856e156ef9e45fba8d62d7e

      SHA512

      f14f12607246dd57388d3b1ad61ff2e815d7539f5108a97f37fab303347e3d5e87d044e7fa73a0010804cb735f0261a0160ba87d4702db34152db57baa97eed3

    • memory/2908-0-0x0000000000B60000-0x0000000000B86000-memory.dmp

      Filesize

      152KB

    • memory/2908-15-0x0000000000B60000-0x0000000000B86000-memory.dmp

      Filesize

      152KB

    • memory/3068-12-0x00000000003B0000-0x00000000003D6000-memory.dmp

      Filesize

      152KB

    • memory/3068-18-0x00000000003B0000-0x00000000003D6000-memory.dmp

      Filesize

      152KB

    • memory/3068-20-0x00000000003B0000-0x00000000003D6000-memory.dmp

      Filesize

      152KB

    • memory/3068-26-0x00000000003B0000-0x00000000003D6000-memory.dmp

      Filesize

      152KB