Analysis

  • max time kernel
    95s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 18:20

General

  • Target

    052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe

  • Size

    94KB

  • MD5

    268c77328410842c8f27c185cf8d3457

  • SHA1

    0091b0533ce4ac188124afd536c7ef5e8f87037f

  • SHA256

    052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0

  • SHA512

    03905e0668021d51a2fdea5501a74853cf1161057e41050b9000b8ce3dd856f9d4a36226eb78e6bd859b174d74d487d7e8fe35c22b168a0f4e15791727aeea23

  • SSDEEP

    1536:VZYFIYC4qWCbHh5HeEHAOCKhlBvm1J4WMF4Zb:VZzK1CDeSCUeE4Zb

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.208

112.175.88.207

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe
    "C:\Users\Admin\AppData\Local\Temp\052b0085bf1f5554a96b15fff17e56ce47187c8392b1c74ef653536c4f7cccc0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\dofhir.exe
      "C:\Users\Admin\AppData\Local\Temp\dofhir.exe"
      2⤵
      • Executes dropped EXE
      PID:1004
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:1728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dofhir.exe

      Filesize

      94KB

      MD5

      c465e08fac955ff2af81ace188ab2219

      SHA1

      bcf6f388647998a58bc5a15e3305477abf52e142

      SHA256

      7bb1ef384df5ed68906a51b123e467974ded358892ea95514b49df8fa6cefb49

      SHA512

      d0c8d517cec6b3738880f516d78eab1d700d93e329b6ed8f092999674ad5b9944740ea7a1bc2a5c155c140f298f29949b70f67870ad7d1f8303b860737fe11d8

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      4adffbc578ceaad93e361c4c2700b4e2

      SHA1

      3078a1c96cf37ee1bde1a548cec44c27f7a8720e

      SHA256

      d0270cf0cebe5fc51dc8d55ffc5d23fcbb682d1822458bcb3d823101ba0a2045

      SHA512

      812400e5e01e5fbaf7917f3d48a40f6d0c6f60bf2602f2827c2d9089022ebf174d04d79bf27bfb67638c78d0b3a86b26e7d4546243491ebb7955f456b9fd9245

    • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

      Filesize

      338B

      MD5

      17523d4d924c0507904a1bad6b50ac89

      SHA1

      fa660cf86ac8b0145b23e17fc2a2ea5cd4c5f3c7

      SHA256

      bde18d42f19947d0ddb9dc8133076b58a77d897ff9a1d12a2bcfe24ccc2fe56f

      SHA512

      09b5b9eb3cd01cc99153bd99269f1926822dab4331768e8b1c8b07be5fcd12c1e43e40debad208abac1bd13b9aa5e0b0e67207e0841cdfe33ba4a88746ba5064

    • memory/1004-12-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1004-17-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1004-19-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1004-26-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3296-0-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3296-14-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB