Analysis

  • max time kernel
    89s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 23:05

General

  • Target

    0d40c6ed3bb93766766f8e0e325acb20N.exe

  • Size

    56KB

  • MD5

    0d40c6ed3bb93766766f8e0e325acb20

  • SHA1

    e00a274d0ebe106424abeef8d72c29b2f86695e9

  • SHA256

    0b1a8603ae89200d97744cfa54e666befe95a937c87d077fd98264bd45f9bd71

  • SHA512

    487ebab1d6a439e4b13815bbeb949c860716566ec7989605c6fc532570305bbb9dfca434664a831a212aa8f25589e2153fcb21d400ddd934f1f17c1e36f5b696

  • SSDEEP

    1536:vMcQYte55zs091Zw9FAGDdJYipvwGf9ogjrgHi:vMhAe5Zs091KI+JYixw49Xjrp

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe
    "C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2308
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    b4a86880004da8726288d7ec954885a8

    SHA1

    1bab1cfbdc2c540246210bc7852f8fe7e8357b31

    SHA256

    c85016a9115aeb492bf116ab05791a9c3e6e30c39274767bd0476bd56a37db46

    SHA512

    22758f6c6de591c99f8f9857c1b03e55c242f0a4987d376b08c30bc608027d1574a228a8230099ddac2a3214663396b016e85d085204155a5ec26f87a28496b4

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    276B

    MD5

    1862e68ee220fca16fb7cdb1a4b04683

    SHA1

    125d071224d1d875b818f1dbc09c59d416aa9a75

    SHA256

    4f3a3113913d3b0da973a9fe0d5dc33520375a6c6b7dc87eff19991f8f043b1e

    SHA512

    90a0b0e6949dd8c41839d1f6cf355de7d9c53e2d385d19c8e5a39b4db8b1802688cd505968d151cc2224d0cf7bde9cef82bb963bb27b34baf631d1657cdc792b

  • \Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    56KB

    MD5

    1b7662002fedd68a4517e271094ad52a

    SHA1

    039bd715a0be727fdd61598c7fa776b8793c041c

    SHA256

    afd7b9c51979e5fb100dafcb43962f505f6a37647c8cb096fd31c923111e7727

    SHA512

    a3204ec11db23398103e8b496adf5c72ded1f30bdef3583f6a5e8ef39b0d95dcf3eb33fb13bb61ce9b1fee17ad698ad7b4c44dc9531a0ec1406f9222a2286e56

  • memory/2108-0-0x00000000010B0000-0x00000000010D6000-memory.dmp

    Filesize

    152KB

  • memory/2108-10-0x0000000000960000-0x0000000000986000-memory.dmp

    Filesize

    152KB

  • memory/2108-18-0x00000000010B0000-0x00000000010D6000-memory.dmp

    Filesize

    152KB

  • memory/2308-11-0x0000000001390000-0x00000000013B6000-memory.dmp

    Filesize

    152KB

  • memory/2308-21-0x0000000001390000-0x00000000013B6000-memory.dmp

    Filesize

    152KB

  • memory/2308-23-0x0000000001390000-0x00000000013B6000-memory.dmp

    Filesize

    152KB

  • memory/2308-30-0x0000000001390000-0x00000000013B6000-memory.dmp

    Filesize

    152KB