Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2024, 00:58 UTC

General

  • Target

    606c454ee732e2e5cfee7786df5787f77ef0dce745205de62f760ef62847572dN.exe

  • Size

    57KB

  • MD5

    3e729ff667755e3013c0208b90f8d470

  • SHA1

    3103c927ff71b3f97d07c97b63fcd48a3a973dbb

  • SHA256

    606c454ee732e2e5cfee7786df5787f77ef0dce745205de62f760ef62847572d

  • SHA512

    de83a9554730f3f523bec965a0c680102fd3e22cf61e439f94a2ef710f7a08ea748c10befed9f89a175cfc22ff49c2e4599628c9626c076a03fb63b4e533afa2

  • SSDEEP

    1536:MQPzemdaNqAPG17k74qlmbbVgYyvxcd5jnGWqN7kS8y:MOemdTd1o74qlmbbJ+x+IkA

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\606c454ee732e2e5cfee7786df5787f77ef0dce745205de62f760ef62847572dN.exe
    "C:\Users\Admin\AppData\Local\Temp\606c454ee732e2e5cfee7786df5787f77ef0dce745205de62f760ef62847572dN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2336
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2548

Network

    No results found
  • 218.54.47.76:11120
    biudfw.exe
    152 B
    3
  • 218.54.47.74:11150
    biudfw.exe
    152 B
    3
  • 218.54.47.76:11170
    biudfw.exe
    152 B
    3
  • 218.54.47.77:11150
    biudfw.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    57KB

    MD5

    f77b58e96d46b6a0a4bf930ba5c0c3b7

    SHA1

    79d47190e3dd86ffe92c4cd71893621f6ee8c073

    SHA256

    e8e156f09906c52a7b5f59b3316c564449f2b7f735c2eee61dc841887b17ee59

    SHA512

    1658a2a06ec13d30eb2787e43b088dbdf7979724d1d19575a7b0cfebd5991d7c2e32cd851dbb0cd9ae4d30f6c0d76031b2a6b1970c654d234123d7bcd7deb4a4

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    7cdc8777d33db85bc19aefb64879a7f7

    SHA1

    f2d494d4dfe93a05eb58513935196e8578648adf

    SHA256

    9af382db716e39144dda99d3d9afbd5df9b65e6a36af229e715c00539bce6336

    SHA512

    34b075db80bf3704f76f9dd28eedffe88c9b3b5f730c79c27b9908fe2865847ae925487de2dcc1a8566bd3836d3b770ca3831d0b110312376684a92e42c6b48f

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    8063f776b54592f243b5f4aad2c84ec7

    SHA1

    42232a4f4a3be66de201753833712625f691112f

    SHA256

    e6ef4e0dd1bc3d1b49ad49dac1d1a4593c890a8c903439f05f2028457a2666aa

    SHA512

    140ae7df0b49ca62bff264115a8784c8dfcde8a923bd58116b90e5d4724792f096b6b2cd7e75e3576ca9b8908e7a55a6afd8f22c75261d1ac6baa3968a60a5bd

  • memory/1620-0-0x0000000000CC0000-0x0000000000CE6000-memory.dmp

    Filesize

    152KB

  • memory/1620-18-0x0000000000CC0000-0x0000000000CE6000-memory.dmp

    Filesize

    152KB

  • memory/1620-16-0x00000000005D0000-0x00000000005F6000-memory.dmp

    Filesize

    152KB

  • memory/2336-19-0x0000000001030000-0x0000000001056000-memory.dmp

    Filesize

    152KB

  • memory/2336-22-0x0000000001030000-0x0000000001056000-memory.dmp

    Filesize

    152KB

  • memory/2336-24-0x0000000001030000-0x0000000001056000-memory.dmp

    Filesize

    152KB

  • memory/2336-31-0x0000000001030000-0x0000000001056000-memory.dmp

    Filesize

    152KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.