Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2024 23:57

General

  • Target

    62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe

  • Size

    333KB

  • MD5

    a08624aa8369a8873d683590fb3f0fed

  • SHA1

    75cb37084b41f2cfc3d9e4ec990a19631375e2b4

  • SHA256

    62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778

  • SHA512

    7431757670d2359ff3fe8a4ca2319ca09e1f3fafb769e3e6c91fdd47d69e978362fcea45995723435fd13bcc3b133a6300cba392659d6a068487d66023639088

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9P:vHW138/iXWlK885rKlGSekcj66ciWP

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe
    "C:\Users\Admin\AppData\Local\Temp\62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Users\Admin\AppData\Local\Temp\qoraq.exe
      "C:\Users\Admin\AppData\Local\Temp\qoraq.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\batif.exe
        "C:\Users\Admin\AppData\Local\Temp\batif.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3504
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    ea2c3ad2177becefa293d8bff004fd8d

    SHA1

    84685598abf20b1813b4c475d5053b1969980504

    SHA256

    d8a231e7959ce5232dfbb8c2501c5fbdfbf669a2226e9a3a8eec2ee7cf6d0dd7

    SHA512

    5b27e8434474413af8ec35ee473cde03c9084420956861f22c81350ec572f70b6809ebbae2e7ccfdf2431149df730e9564f8e2456d72665fb364b86859c04ae6

  • C:\Users\Admin\AppData\Local\Temp\batif.exe

    Filesize

    172KB

    MD5

    6f919aebeae544c9006a44ca8aac72b7

    SHA1

    090685521400b39ab7a9c6c4f3b5cf5b22570cdc

    SHA256

    5dc86fce717ecd932b9262888743b4ef747779ae36776496a344fc6e2c11abd1

    SHA512

    de46a83790e2cb11b1e536c3ffe4ce8a0b06eb85b83299373628bed546ef40f83f6eb2a9460b01f83fec50481e67d3a59a56ff8cd4101a6f74ac9e50866fe18b

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    c7c1a63f66a92079f753fcb8d564c56c

    SHA1

    33c4b104764762b6b0805255318334acf00a2c33

    SHA256

    683e4e6fe7b4417ecd491e3add8cee15e1fa6e74b126e681277d125117fe2c69

    SHA512

    71a6b235fb871555695988ddfb33a0683bb9ad93f7619d91bdc66de8626e7610faf589d03f26ddf1ed20eda7aa484b99c820e05ac45a6388e3c85364c0fe67c8

  • C:\Users\Admin\AppData\Local\Temp\qoraq.exe

    Filesize

    333KB

    MD5

    6db4b33a355cf3a75f5915809f51f83d

    SHA1

    7cfa6e011237587b535c76f4a373dc1859cf24e4

    SHA256

    0af8b6b21af20af2621a9932feb695fa9fbc6644dbe8dfc07f847478e78fb809

    SHA512

    84370e2c712e0c89d1920ed506a7a1dc555a18a3b1629d2ff5ef3a8038eb463c4c0139c639ccb05c04b8373cc2ee00637d8c23f376ad7ab37230f5de054f1c2f

  • memory/3504-47-0x00000000005E0000-0x00000000005E2000-memory.dmp

    Filesize

    8KB

  • memory/3504-48-0x0000000000FF0000-0x0000000001089000-memory.dmp

    Filesize

    612KB

  • memory/3504-51-0x0000000000FF0000-0x0000000001089000-memory.dmp

    Filesize

    612KB

  • memory/3504-50-0x0000000000FF0000-0x0000000001089000-memory.dmp

    Filesize

    612KB

  • memory/3504-49-0x0000000000FF0000-0x0000000001089000-memory.dmp

    Filesize

    612KB

  • memory/3504-46-0x0000000000FF0000-0x0000000001089000-memory.dmp

    Filesize

    612KB

  • memory/3504-38-0x0000000000FF0000-0x0000000001089000-memory.dmp

    Filesize

    612KB

  • memory/3504-42-0x0000000000FF0000-0x0000000001089000-memory.dmp

    Filesize

    612KB

  • memory/3504-39-0x00000000005E0000-0x00000000005E2000-memory.dmp

    Filesize

    8KB

  • memory/3968-41-0x0000000000430000-0x00000000004B1000-memory.dmp

    Filesize

    516KB

  • memory/3968-20-0x0000000000430000-0x00000000004B1000-memory.dmp

    Filesize

    516KB

  • memory/3968-14-0x0000000000F80000-0x0000000000F81000-memory.dmp

    Filesize

    4KB

  • memory/3968-21-0x0000000000F80000-0x0000000000F81000-memory.dmp

    Filesize

    4KB

  • memory/3968-11-0x0000000000430000-0x00000000004B1000-memory.dmp

    Filesize

    516KB

  • memory/4036-1-0x0000000000F00000-0x0000000000F01000-memory.dmp

    Filesize

    4KB

  • memory/4036-0-0x00000000004B0000-0x0000000000531000-memory.dmp

    Filesize

    516KB

  • memory/4036-17-0x00000000004B0000-0x0000000000531000-memory.dmp

    Filesize

    516KB