Analysis

  • max time kernel
    98s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 23:05

General

  • Target

    0d40c6ed3bb93766766f8e0e325acb20N.exe

  • Size

    56KB

  • MD5

    0d40c6ed3bb93766766f8e0e325acb20

  • SHA1

    e00a274d0ebe106424abeef8d72c29b2f86695e9

  • SHA256

    0b1a8603ae89200d97744cfa54e666befe95a937c87d077fd98264bd45f9bd71

  • SHA512

    487ebab1d6a439e4b13815bbeb949c860716566ec7989605c6fc532570305bbb9dfca434664a831a212aa8f25589e2153fcb21d400ddd934f1f17c1e36f5b696

  • SSDEEP

    1536:vMcQYte55zs091Zw9FAGDdJYipvwGf9ogjrgHi:vMhAe5Zs091KI+JYixw49Xjrp

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe
    "C:\Users\Admin\AppData\Local\Temp\0d40c6ed3bb93766766f8e0e325acb20N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2832
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:4808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

      Filesize

      56KB

      MD5

      ed6b369be3e1ce06675a64afb5b3ccff

      SHA1

      243e8f42c33d030b37c2d4e2947a45f66ee08a27

      SHA256

      81c205732de13de273eb7e1e16854ad008144dd715d263ba3f2c58b04a001b39

      SHA512

      816597c54cea206d6a4e18b3e84b75c331bc694315833ad2457121ec2646a29cd0d9baff4eee0e7a81a9d9ee71be6aee32dfe916745f0aa084a75a4cc0c18e34

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      b4a86880004da8726288d7ec954885a8

      SHA1

      1bab1cfbdc2c540246210bc7852f8fe7e8357b31

      SHA256

      c85016a9115aeb492bf116ab05791a9c3e6e30c39274767bd0476bd56a37db46

      SHA512

      22758f6c6de591c99f8f9857c1b03e55c242f0a4987d376b08c30bc608027d1574a228a8230099ddac2a3214663396b016e85d085204155a5ec26f87a28496b4

    • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

      Filesize

      276B

      MD5

      1862e68ee220fca16fb7cdb1a4b04683

      SHA1

      125d071224d1d875b818f1dbc09c59d416aa9a75

      SHA256

      4f3a3113913d3b0da973a9fe0d5dc33520375a6c6b7dc87eff19991f8f043b1e

      SHA512

      90a0b0e6949dd8c41839d1f6cf355de7d9c53e2d385d19c8e5a39b4db8b1802688cd505968d151cc2224d0cf7bde9cef82bb963bb27b34baf631d1657cdc792b

    • memory/2832-12-0x0000000000A10000-0x0000000000A36000-memory.dmp

      Filesize

      152KB

    • memory/2832-17-0x0000000000A10000-0x0000000000A36000-memory.dmp

      Filesize

      152KB

    • memory/2832-19-0x0000000000A10000-0x0000000000A36000-memory.dmp

      Filesize

      152KB

    • memory/2832-25-0x0000000000A10000-0x0000000000A36000-memory.dmp

      Filesize

      152KB

    • memory/3496-0-0x00000000006A0000-0x00000000006C6000-memory.dmp

      Filesize

      152KB

    • memory/3496-14-0x00000000006A0000-0x00000000006C6000-memory.dmp

      Filesize

      152KB