Malware Analysis Report

2024-11-16 13:26

Sample ID 241008-edd5vs1fnc
Target e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915
SHA256 e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915
Tags
urelas discovery trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915

Threat Level: Known bad

The file e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915 was found to be: Known bad.

Malicious Activity Summary

urelas discovery trojan

Urelas

Executes dropped EXE

Loads dropped DLL

Deletes itself

Checks computer location settings

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-08 03:49

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-08 03:49

Reported

2024-10-08 05:41

Platform

win7-20240903-en

Max time kernel

118s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe"

Signatures

Urelas

trojan urelas

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe

"C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe"

C:\Users\Admin\AppData\Local\Temp\biudfw.exe

"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "

Network

Country Destination Domain Proto
KR 218.54.47.76:11120 tcp
KR 218.54.47.74:11150 tcp
KR 218.54.47.76:11170 tcp
KR 218.54.47.77:11150 tcp

Files

memory/2528-0-0x0000000000F50000-0x0000000000F75000-memory.dmp

\Users\Admin\AppData\Local\Temp\biudfw.exe

MD5 40fb38cf1be2a1405dce2b5e7dde16e5
SHA1 367f7b36e3f010f5c53a26934d883a6d37a0e72d
SHA256 c04109096b4fee21fa0d05a60f61e0a0d81b3807f0f3c9f5d964a85973892260
SHA512 e5e1b43463b15f6a079683fca05ff8c69b8f9be2ad338429212441e2e35e70ce008f59e38d5c1586069ffe772d19077ed6202bcedc2f48f8121cbe8cfa3c1532

memory/2528-6-0x0000000000560000-0x0000000000585000-memory.dmp

memory/1892-10-0x00000000009B0000-0x00000000009D5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

MD5 d553fc08a8dc8ffd8e7eb137ec272a07
SHA1 7d1a0eed91baeb4d78d65d10a24b28972db161d4
SHA256 609f42f37f95b9040cae6e45cc43b9e2fbf69c62facf26b6a98adeb3039f39c6
SHA512 bfb89d12c7ca45908da2dd39ee88ce2bc83c3df024e3fa30b4bed715a8d0f7d0b6c9154ce764e28d11a79899b827dd07b6dfd69b5511d623b83178ac71739eba

memory/2528-19-0x0000000000F50000-0x0000000000F75000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

MD5 f02bf69ff6351970bce3b50742a769ed
SHA1 577db2279b6489628583d770f441f3316ff2a560
SHA256 df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0
SHA512 42a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979

memory/1892-22-0x00000000009B0000-0x00000000009D5000-memory.dmp

memory/1892-24-0x00000000009B0000-0x00000000009D5000-memory.dmp

memory/1892-31-0x00000000009B0000-0x00000000009D5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-08 03:49

Reported

2024-10-08 10:50

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe"

Signatures

Urelas

trojan urelas

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\biudfw.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe

"C:\Users\Admin\AppData\Local\Temp\e226a8e824ea0caa51aeacb1639d0fbbab0abe0233e40b4a835bb1817dbac915.exe"

C:\Users\Admin\AppData\Local\Temp\biudfw.exe

"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
KR 218.54.47.76:11120 tcp
KR 218.54.47.74:11150 tcp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
KR 218.54.47.76:11170 tcp
KR 218.54.47.77:11150 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp

Files

memory/3212-0-0x0000000000120000-0x0000000000145000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\biudfw.exe

MD5 4e02e29ef14efbebe4637dbcfc5e64c6
SHA1 4289cc6444ec9b5831bd4e7e441360a546f2cfbb
SHA256 1f43beb3a31d04efa5abb866e0e456bc6262babfd9300a325b2852d75a13ce27
SHA512 de4d0e92ed539e3061bfef260f2558eba398442d11f3e5d53e4c13208f7023054f7d68a33982e82dce1b5cce88b5194c9b01f770825a6b8a359e6a439eb2ea0a

memory/5100-12-0x0000000000BF0000-0x0000000000C15000-memory.dmp

memory/3212-14-0x0000000000120000-0x0000000000145000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

MD5 d553fc08a8dc8ffd8e7eb137ec272a07
SHA1 7d1a0eed91baeb4d78d65d10a24b28972db161d4
SHA256 609f42f37f95b9040cae6e45cc43b9e2fbf69c62facf26b6a98adeb3039f39c6
SHA512 bfb89d12c7ca45908da2dd39ee88ce2bc83c3df024e3fa30b4bed715a8d0f7d0b6c9154ce764e28d11a79899b827dd07b6dfd69b5511d623b83178ac71739eba

C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

MD5 f02bf69ff6351970bce3b50742a769ed
SHA1 577db2279b6489628583d770f441f3316ff2a560
SHA256 df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0
SHA512 42a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979

memory/5100-17-0x0000000000BF0000-0x0000000000C15000-memory.dmp

memory/5100-19-0x0000000000BF0000-0x0000000000C15000-memory.dmp

memory/5100-25-0x0000000000BF0000-0x0000000000C15000-memory.dmp