Analysis Overview
SHA256
e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538
Threat Level: Known bad
The file e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538 was found to be: Known bad.
Malicious Activity Summary
Urelas
Urelas family
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Deletes itself
System Location Discovery: System Language Discovery
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-08 04:26
Signatures
Urelas family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-08 04:26
Reported
2024-08-08 04:29
Platform
win7-20240708-en
Max time kernel
89s
Max time network
77s
Command Line
Signatures
Urelas
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe
"C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe"
C:\Users\Admin\AppData\Local\Temp\biudfw.exe
"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
Network
| Country | Destination | Domain | Proto |
| KR | 218.54.47.76:11120 | tcp | |
| KR | 218.54.47.74:11150 | tcp | |
| KR | 218.54.47.76:11170 | tcp | |
| KR | 218.54.47.77:11150 | tcp |
Files
memory/2908-0-0x0000000000BA0000-0x0000000000BD2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\sanfdr.bat
| MD5 | 76f302068a68c03f25075e2641ab9585 |
| SHA1 | 56ca61df60b4731f30f590feca70e7e435c0040f |
| SHA256 | 5a058c49c610b0b0431de106c3a9531ce1621ffae459bfba6574bf9f8229a8aa |
| SHA512 | 3d58e90e3e5662efe1b3267b4a30bf2d2bf2ea346732e802fbafa0862364add065fcf8c69ee401f0c0ea27d6232eb147299beb9b29c83885028ae2c1d64a1bf7 |
C:\Users\Admin\AppData\Local\Temp\biudfw.exe
| MD5 | 28a115f1ccd64ad84874f79744b88c86 |
| SHA1 | 8c40947c66b5a66c940247847fcc79aacfb1cb6e |
| SHA256 | e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538 |
| SHA512 | 5adfeb33cb5a5d8b57f65af20ac28c60c23196584a5bb6fa04910bea1795e7c0f3fc09e67b0a47f4da265b29b1ab2d392b141d793692e3e71d512d457066f0ae |
memory/2908-18-0x0000000000BA0000-0x0000000000BD2000-memory.dmp
memory/2252-17-0x0000000000E90000-0x0000000000EC2000-memory.dmp
memory/2908-16-0x00000000004B0000-0x00000000004E2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\golfinfo.ini
| MD5 | f47bdd41c1b4fbef2cc1e4cc3d66207c |
| SHA1 | 7c3551488d0fddf73b132a27b4e874a03dd6a681 |
| SHA256 | 6fe0f2d8124bf442f99d414908fd1d2c8cccc1f39c8b9e8f7f95a923de1b9a87 |
| SHA512 | bf9deb15cebbd72197e33fe7885b2b89de57a113297c9a0cf7a62378c114880ebd3c96772a3cb2fd58f39b0d92856df1f8620bf326a1c3725a386b32dec08142 |
memory/2252-21-0x0000000000E90000-0x0000000000EC2000-memory.dmp
memory/2252-22-0x0000000000E90000-0x0000000000EC2000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-08 04:26
Reported
2024-08-08 04:29
Platform
win10v2004-20240802-en
Max time kernel
93s
Max time network
94s
Command Line
Signatures
Urelas
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe
"C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe"
C:\Users\Admin\AppData\Local\Temp\biudfw.exe
"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| KR | 218.54.47.76:11120 | tcp | |
| KR | 218.54.47.74:11150 | tcp | |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| KR | 218.54.47.76:11170 | tcp | |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| KR | 218.54.47.77:11150 | tcp | |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
memory/2396-0-0x0000000000A00000-0x0000000000A32000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\biudfw.exe
| MD5 | f237d637476b6945430d95ad13c7b433 |
| SHA1 | 133a663987a283adb8bf27289780a4a8cd49871e |
| SHA256 | 1d070776f13a16242eba47ff911679ceebeda37175e7d12b920da197494a3aea |
| SHA512 | 2d49ecffe3541413c48e63af6b95b1e5808109fb79afce4f325d71f1c293de87e235ed7dc6e89f0a2dd1b10a72bb6aaaa71e8bd372a1ec146a3aea7e6a4c8138 |
memory/2796-15-0x00000000007E0000-0x0000000000812000-memory.dmp
memory/2396-17-0x0000000000A00000-0x0000000000A32000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\sanfdr.bat
| MD5 | 76f302068a68c03f25075e2641ab9585 |
| SHA1 | 56ca61df60b4731f30f590feca70e7e435c0040f |
| SHA256 | 5a058c49c610b0b0431de106c3a9531ce1621ffae459bfba6574bf9f8229a8aa |
| SHA512 | 3d58e90e3e5662efe1b3267b4a30bf2d2bf2ea346732e802fbafa0862364add065fcf8c69ee401f0c0ea27d6232eb147299beb9b29c83885028ae2c1d64a1bf7 |
C:\Users\Admin\AppData\Local\Temp\golfinfo.ini
| MD5 | f47bdd41c1b4fbef2cc1e4cc3d66207c |
| SHA1 | 7c3551488d0fddf73b132a27b4e874a03dd6a681 |
| SHA256 | 6fe0f2d8124bf442f99d414908fd1d2c8cccc1f39c8b9e8f7f95a923de1b9a87 |
| SHA512 | bf9deb15cebbd72197e33fe7885b2b89de57a113297c9a0cf7a62378c114880ebd3c96772a3cb2fd58f39b0d92856df1f8620bf326a1c3725a386b32dec08142 |
memory/2796-20-0x00000000007E0000-0x0000000000812000-memory.dmp
memory/2796-21-0x00000000007E0000-0x0000000000812000-memory.dmp