Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 22:48

General

  • Target

    836ab70974363b42bac1efc3107febc7cb063cbd0b473521284f1f1354462abf.exe

  • Size

    475KB

  • MD5

    5bda45a12aad3128265a307785d68642

  • SHA1

    28cd0d60564726f6a932b563c59510587a31e04f

  • SHA256

    836ab70974363b42bac1efc3107febc7cb063cbd0b473521284f1f1354462abf

  • SHA512

    ea60fbbd169469abcd75ba84b4779cbb1843fc1f7f0af8d0760ec3d5463a1ac888429f87a4507fba5e7422164338cdd6687f40f471c0f081cc1c3b05205d3514

  • SSDEEP

    12288:93CtSokfFGUMKwlTIU/b37dJ75WEe+eKTxB6mZX:9x9GzHlTv/b35tecFB6g

Score
10/10

Malware Config

Extracted

Family

urelas

C2

121.88.5.183

121.88.5.184

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\836ab70974363b42bac1efc3107febc7cb063cbd0b473521284f1f1354462abf.exe
    "C:\Users\Admin\AppData\Local\Temp\836ab70974363b42bac1efc3107febc7cb063cbd0b473521284f1f1354462abf.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Users\Admin\AppData\Local\Temp\sander.exe
      "C:\Users\Admin\AppData\Local\Temp\sander.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2996
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_sannuyex.bat

          Filesize

          341B

          MD5

          fbf013e1f3dc8909c5806662e13ec8c0

          SHA1

          4a7a31de3408c23e1de4243ef8c113126cfde7fc

          SHA256

          81fb42d98f502a99ceb69fb0df9c67cb27c8856d77766b13b7a7a6e1eab28a13

          SHA512

          9192c250ae4dc3197f913f8dc8455ed15489b0d5100f3e6d39781783acd78b52db43f40b9599ad4ee879806ed066ea593c582f06eeb98461d6817962220668ab

        • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

          Filesize

          512B

          MD5

          145cec05d8d704ff7aa3d812b1aff628

          SHA1

          097ae09965ed3804359803708b8af87b5b90fcbb

          SHA256

          66c8ae290d7cf992faf67b10d1ef8ad91857f3709f459af69b6a11f521a3aeea

          SHA512

          1037d7926aec2831c8b084cc19aa38ce91bc8dcff15af731ce0e7cea79fa7806d4d341a9535c39b0ccb8d6f19bc2badf6d20d3b4ab1c931cd5be6994c4323b9d

        • C:\Users\Admin\AppData\Local\Temp\sander.exe

          Filesize

          475KB

          MD5

          781b61f74dbe208d4339190bbfd5a660

          SHA1

          c2a878a4f714b01c2bb13dc3851567f469ea1cc7

          SHA256

          95d7498efd61a681ef31dbd852c728082a50e4f4dea06e4b99d9002c6ea98e01

          SHA512

          da69a492691b7ceb01e90c8ed6c82730de408471e95330963e0c419170df6dfadb6cf4ad9836d2ecc6d5cd31657893424c17d8c94e45c46ed89d2a2d8b182539

        • memory/2996-14-0x0000000000920000-0x00000000009A2000-memory.dmp

          Filesize

          520KB

        • memory/2996-11-0x0000000000920000-0x00000000009A2000-memory.dmp

          Filesize

          520KB

        • memory/2996-19-0x0000000000920000-0x00000000009A2000-memory.dmp

          Filesize

          520KB

        • memory/2996-20-0x0000000000920000-0x00000000009A2000-memory.dmp

          Filesize

          520KB

        • memory/4728-0-0x0000000000860000-0x00000000008E2000-memory.dmp

          Filesize

          520KB

        • memory/4728-1-0x0000000000860000-0x00000000008E2000-memory.dmp

          Filesize

          520KB

        • memory/4728-16-0x0000000000860000-0x00000000008E2000-memory.dmp

          Filesize

          520KB