Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 02:02

General

  • Target

    b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe

  • Size

    56KB

  • MD5

    6bc6d3ef3a45c337462b692271b09cce

  • SHA1

    17d474c1246cce14805e53ed25d9105aaa4bae20

  • SHA256

    b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130

  • SHA512

    a52fa030193233ea0a1c30d0432dd826ac8987df27abe0c3e9db9309d095723052c6d74711f09e776abb8d6a6002e4f60765aac1377eb3b622698f5b92be1cad

  • SSDEEP

    1536:MQPzemdaNqAPG17k74qlmbbVgYyvxcd5jnGWqN7kS8lR:MOemdTd1o74qlmbbJ+x+IkfR

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c484ae2e82dbbfe49f670f4bd578c5e054e112d49979439d184161ee701130.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      PID:2028
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:5064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

      Filesize

      56KB

      MD5

      53bb932c2f1ad5b1d66a55128efd9bff

      SHA1

      4ddbef51105321e728a57d96089caa8627734987

      SHA256

      19b00bfc76ddb51e9bb9ae06af7b514e3f7a23fbd0b9e13b0771a163179409e1

      SHA512

      04fce5ad7315b1f3cc1a4cc69c5e84643fd72bb040b721159ac5db54947ad7d23fcae42cee56a06ae8d4e469c597338a27f171a45a7b4f66dcf692237ea5ea19

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      7cdc8777d33db85bc19aefb64879a7f7

      SHA1

      f2d494d4dfe93a05eb58513935196e8578648adf

      SHA256

      9af382db716e39144dda99d3d9afbd5df9b65e6a36af229e715c00539bce6336

      SHA512

      34b075db80bf3704f76f9dd28eedffe88c9b3b5f730c79c27b9908fe2865847ae925487de2dcc1a8566bd3836d3b770ca3831d0b110312376684a92e42c6b48f

    • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

      Filesize

      338B

      MD5

      1b5f87a2c264bbacfbaff342e5ba5d25

      SHA1

      6c09d0ba1e0bc89626ee288b968f2175be68e1bb

      SHA256

      780cce8830d586580fadaa90b9c97db0670c45befc47c2a7ba824c786d342850

      SHA512

      25639c8f8b19d986fa0b941368af023da45613563f9886f82ca9423d95371198014e01ee2cbc4a73aa6b42c39631599b48f1a0680c352d2921485426098f9eb8

    • memory/1368-0-0x00000000006E0000-0x0000000000706000-memory.dmp

      Filesize

      152KB

    • memory/1368-15-0x00000000006E0000-0x0000000000706000-memory.dmp

      Filesize

      152KB

    • memory/2028-13-0x0000000000D40000-0x0000000000D66000-memory.dmp

      Filesize

      152KB

    • memory/2028-18-0x0000000000D40000-0x0000000000D66000-memory.dmp

      Filesize

      152KB

    • memory/2028-20-0x0000000000D40000-0x0000000000D66000-memory.dmp

      Filesize

      152KB

    • memory/2028-27-0x0000000000D40000-0x0000000000D66000-memory.dmp

      Filesize

      152KB