Malware Analysis Report

2024-11-16 13:28

Sample ID 240808-e22k3atbjc
Target e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538
SHA256 e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538
Tags
urelas discovery trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538

Threat Level: Known bad

The file e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538 was found to be: Known bad.

Malicious Activity Summary

urelas discovery trojan

Urelas

Urelas family

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Deletes itself

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-08 04:26

Signatures

Urelas family

urelas

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-08 04:26

Reported

2024-08-08 04:29

Platform

win7-20240708-en

Max time kernel

89s

Max time network

77s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe"

Signatures

Urelas

trojan urelas

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe

"C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe"

C:\Users\Admin\AppData\Local\Temp\biudfw.exe

"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "

Network

Country Destination Domain Proto
KR 218.54.47.76:11120 tcp
KR 218.54.47.74:11150 tcp
KR 218.54.47.76:11170 tcp
KR 218.54.47.77:11150 tcp

Files

memory/2908-0-0x0000000000BA0000-0x0000000000BD2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

MD5 76f302068a68c03f25075e2641ab9585
SHA1 56ca61df60b4731f30f590feca70e7e435c0040f
SHA256 5a058c49c610b0b0431de106c3a9531ce1621ffae459bfba6574bf9f8229a8aa
SHA512 3d58e90e3e5662efe1b3267b4a30bf2d2bf2ea346732e802fbafa0862364add065fcf8c69ee401f0c0ea27d6232eb147299beb9b29c83885028ae2c1d64a1bf7

C:\Users\Admin\AppData\Local\Temp\biudfw.exe

MD5 28a115f1ccd64ad84874f79744b88c86
SHA1 8c40947c66b5a66c940247847fcc79aacfb1cb6e
SHA256 e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538
SHA512 5adfeb33cb5a5d8b57f65af20ac28c60c23196584a5bb6fa04910bea1795e7c0f3fc09e67b0a47f4da265b29b1ab2d392b141d793692e3e71d512d457066f0ae

memory/2908-18-0x0000000000BA0000-0x0000000000BD2000-memory.dmp

memory/2252-17-0x0000000000E90000-0x0000000000EC2000-memory.dmp

memory/2908-16-0x00000000004B0000-0x00000000004E2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

MD5 f47bdd41c1b4fbef2cc1e4cc3d66207c
SHA1 7c3551488d0fddf73b132a27b4e874a03dd6a681
SHA256 6fe0f2d8124bf442f99d414908fd1d2c8cccc1f39c8b9e8f7f95a923de1b9a87
SHA512 bf9deb15cebbd72197e33fe7885b2b89de57a113297c9a0cf7a62378c114880ebd3c96772a3cb2fd58f39b0d92856df1f8620bf326a1c3725a386b32dec08142

memory/2252-21-0x0000000000E90000-0x0000000000EC2000-memory.dmp

memory/2252-22-0x0000000000E90000-0x0000000000EC2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-08 04:26

Reported

2024-08-08 04:29

Platform

win10v2004-20240802-en

Max time kernel

93s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe"

Signatures

Urelas

trojan urelas

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe

"C:\Users\Admin\AppData\Local\Temp\e52252e39f5decd467ee26ca0866fb0c4c36f64a92e2ee6dc2805d1b42d7e538.exe"

C:\Users\Admin\AppData\Local\Temp\biudfw.exe

"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "

Network

Country Destination Domain Proto
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
KR 218.54.47.76:11120 tcp
KR 218.54.47.74:11150 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
KR 218.54.47.76:11170 tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
KR 218.54.47.77:11150 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp

Files

memory/2396-0-0x0000000000A00000-0x0000000000A32000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\biudfw.exe

MD5 f237d637476b6945430d95ad13c7b433
SHA1 133a663987a283adb8bf27289780a4a8cd49871e
SHA256 1d070776f13a16242eba47ff911679ceebeda37175e7d12b920da197494a3aea
SHA512 2d49ecffe3541413c48e63af6b95b1e5808109fb79afce4f325d71f1c293de87e235ed7dc6e89f0a2dd1b10a72bb6aaaa71e8bd372a1ec146a3aea7e6a4c8138

memory/2796-15-0x00000000007E0000-0x0000000000812000-memory.dmp

memory/2396-17-0x0000000000A00000-0x0000000000A32000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

MD5 76f302068a68c03f25075e2641ab9585
SHA1 56ca61df60b4731f30f590feca70e7e435c0040f
SHA256 5a058c49c610b0b0431de106c3a9531ce1621ffae459bfba6574bf9f8229a8aa
SHA512 3d58e90e3e5662efe1b3267b4a30bf2d2bf2ea346732e802fbafa0862364add065fcf8c69ee401f0c0ea27d6232eb147299beb9b29c83885028ae2c1d64a1bf7

C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

MD5 f47bdd41c1b4fbef2cc1e4cc3d66207c
SHA1 7c3551488d0fddf73b132a27b4e874a03dd6a681
SHA256 6fe0f2d8124bf442f99d414908fd1d2c8cccc1f39c8b9e8f7f95a923de1b9a87
SHA512 bf9deb15cebbd72197e33fe7885b2b89de57a113297c9a0cf7a62378c114880ebd3c96772a3cb2fd58f39b0d92856df1f8620bf326a1c3725a386b32dec08142

memory/2796-20-0x00000000007E0000-0x0000000000812000-memory.dmp

memory/2796-21-0x00000000007E0000-0x0000000000812000-memory.dmp