Analysis Overview
SHA256
e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915
Threat Level: Known bad
The file e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915 was found to be: Known bad.
Malicious Activity Summary
Urelas
Executes dropped EXE
Loads dropped DLL
Deletes itself
Checks computer location settings
System Location Discovery: System Language Discovery
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-10-08 03:49
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-08 03:49
Reported
2024-10-08 05:41
Platform
win7-20240903-en
Max time kernel
118s
Max time network
129s
Command Line
Signatures
Urelas
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe
"C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe"
C:\Users\Admin\AppData\Local\Temp\biudfw.exe
"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
Network
| Country | Destination | Domain | Proto |
| KR | 218.54.47.76:11120 | tcp | |
| KR | 218.54.47.74:11150 | tcp | |
| KR | 218.54.47.76:11170 | tcp | |
| KR | 218.54.47.77:11150 | tcp |
Files
memory/2528-0-0x0000000000F50000-0x0000000000F75000-memory.dmp
\Users\Admin\AppData\Local\Temp\biudfw.exe
| MD5 | 40fb38cf1be2a1405dce2b5e7dde16e5 |
| SHA1 | 367f7b36e3f010f5c53a26934d883a6d37a0e72d |
| SHA256 | c04109096b4fee21fa0d05a60f61e0a0d81b3807f0f3c9f5d964a85973892260 |
| SHA512 | e5e1b43463b15f6a079683fca05ff8c69b8f9be2ad338429212441e2e35e70ce008f59e38d5c1586069ffe772d19077ed6202bcedc2f48f8121cbe8cfa3c1532 |
memory/2528-6-0x0000000000560000-0x0000000000585000-memory.dmp
memory/1892-10-0x00000000009B0000-0x00000000009D5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\sanfdr.bat
| MD5 | d553fc08a8dc8ffd8e7eb137ec272a07 |
| SHA1 | 7d1a0eed91baeb4d78d65d10a24b28972db161d4 |
| SHA256 | 609f42f37f95b9040cae6e45cc43b9e2fbf69c62facf26b6a98adeb3039f39c6 |
| SHA512 | bfb89d12c7ca45908da2dd39ee88ce2bc83c3df024e3fa30b4bed715a8d0f7d0b6c9154ce764e28d11a79899b827dd07b6dfd69b5511d623b83178ac71739eba |
memory/2528-19-0x0000000000F50000-0x0000000000F75000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\golfinfo.ini
| MD5 | f02bf69ff6351970bce3b50742a769ed |
| SHA1 | 577db2279b6489628583d770f441f3316ff2a560 |
| SHA256 | df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0 |
| SHA512 | 42a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979 |
memory/1892-22-0x00000000009B0000-0x00000000009D5000-memory.dmp
memory/1892-24-0x00000000009B0000-0x00000000009D5000-memory.dmp
memory/1892-31-0x00000000009B0000-0x00000000009D5000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-10-08 03:49
Reported
2024-10-08 10:50
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
152s
Command Line
Signatures
Urelas
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\biudfw.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe
"C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe"
C:\Users\Admin\AppData\Local\Temp\biudfw.exe
"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| KR | 218.54.47.76:11120 | tcp | |
| KR | 218.54.47.74:11150 | tcp | |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| KR | 218.54.47.76:11170 | tcp | |
| KR | 218.54.47.77:11150 | tcp | |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
memory/3212-0-0x0000000000120000-0x0000000000145000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\biudfw.exe
| MD5 | 4e02e29ef14efbebe4637dbcfc5e64c6 |
| SHA1 | 4289cc6444ec9b5831bd4e7e441360a546f2cfbb |
| SHA256 | 1f43beb3a31d04efa5abb866e0e456bc6262babfd9300a325b2852d75a13ce27 |
| SHA512 | de4d0e92ed539e3061bfef260f2558eba398442d11f3e5d53e4c13208f7023054f7d68a33982e82dce1b5cce88b5194c9b01f770825a6b8a359e6a439eb2ea0a |
memory/5100-12-0x0000000000BF0000-0x0000000000C15000-memory.dmp
memory/3212-14-0x0000000000120000-0x0000000000145000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\sanfdr.bat
| MD5 | d553fc08a8dc8ffd8e7eb137ec272a07 |
| SHA1 | 7d1a0eed91baeb4d78d65d10a24b28972db161d4 |
| SHA256 | 609f42f37f95b9040cae6e45cc43b9e2fbf69c62facf26b6a98adeb3039f39c6 |
| SHA512 | bfb89d12c7ca45908da2dd39ee88ce2bc83c3df024e3fa30b4bed715a8d0f7d0b6c9154ce764e28d11a79899b827dd07b6dfd69b5511d623b83178ac71739eba |
C:\Users\Admin\AppData\Local\Temp\golfinfo.ini
| MD5 | f02bf69ff6351970bce3b50742a769ed |
| SHA1 | 577db2279b6489628583d770f441f3316ff2a560 |
| SHA256 | df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0 |
| SHA512 | 42a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979 |
memory/5100-17-0x0000000000BF0000-0x0000000000C15000-memory.dmp
memory/5100-19-0x0000000000BF0000-0x0000000000C15000-memory.dmp
memory/5100-25-0x0000000000BF0000-0x0000000000C15000-memory.dmp