Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2024, 00:00

General

  • Target

    62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe

  • Size

    333KB

  • MD5

    a08624aa8369a8873d683590fb3f0fed

  • SHA1

    75cb37084b41f2cfc3d9e4ec990a19631375e2b4

  • SHA256

    62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778

  • SHA512

    7431757670d2359ff3fe8a4ca2319ca09e1f3fafb769e3e6c91fdd47d69e978362fcea45995723435fd13bcc3b133a6300cba392659d6a068487d66023639088

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY9P:vHW138/iXWlK885rKlGSekcj66ciWP

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe
    "C:\Users\Admin\AppData\Local\Temp\62330b9026c956b6580fd086b2171bf50887fe298259ac0b7e53d9e019f59778.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\yvryk.exe
      "C:\Users\Admin\AppData\Local\Temp\yvryk.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Users\Admin\AppData\Local\Temp\jucif.exe
        "C:\Users\Admin\AppData\Local\Temp\jucif.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:484
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    ea2c3ad2177becefa293d8bff004fd8d

    SHA1

    84685598abf20b1813b4c475d5053b1969980504

    SHA256

    d8a231e7959ce5232dfbb8c2501c5fbdfbf669a2226e9a3a8eec2ee7cf6d0dd7

    SHA512

    5b27e8434474413af8ec35ee473cde03c9084420956861f22c81350ec572f70b6809ebbae2e7ccfdf2431149df730e9564f8e2456d72665fb364b86859c04ae6

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    9605c009b54cbb4aabdd80ba6d6e3a99

    SHA1

    d61891cd8b63ddda2588f0f0a79f6baef1dc0d2e

    SHA256

    5156c42aab4328613dfe9143d4c6b137b7bee52ea4ac8353d71eb78104401b98

    SHA512

    d6a7369436993d44a94c6cb311a395436ee7295e53b5446a1747bcffb6dba297dfb7d40a760db71f2e6b44477cbfed0ea94e973560a6a764ca821dea41ec7364

  • C:\Users\Admin\AppData\Local\Temp\yvryk.exe

    Filesize

    333KB

    MD5

    f624273ff793659cc08174deb6e407a7

    SHA1

    115a5b08423a457e565040e9d485dde28aa8ed6d

    SHA256

    75a2a4934bb60238a02b2cedd7ec056ca698f978b1d5ea5ec18fdd2050179292

    SHA512

    e6d1bd3dd0afa60ba013551eb8b61a94e533fa95e6451fb98832b1e7b58d9ae76452737155ffd7519f7823b938c4459e3df51c7390bcbe89ae2b13fbac337f34

  • \Users\Admin\AppData\Local\Temp\jucif.exe

    Filesize

    172KB

    MD5

    45a0b85aebee2311b54f990a29969159

    SHA1

    848734b5350d0603ac3f499ef2eb24fdf551296e

    SHA256

    9ce7b243ef3f4f0752b9405ff41e99f60e44d941f2ee201da6fa6f9ca0eb25a6

    SHA512

    679562a68c81bb8279891ae0eea1cb30720efe3b7ee6427203e6411965d6c6547871cd8f936f157c353ffacb11771859781b98fcdfc27208ae958388483f8e9c

  • \Users\Admin\AppData\Local\Temp\yvryk.exe

    Filesize

    333KB

    MD5

    96c3300eb9f91d37f240a879372ec6b5

    SHA1

    2197adb7c73a8343fe63ec5f432da3c6fd42ea9b

    SHA256

    9ee381708fe040b9d2309dc7c07104dbae61b5681cb3a83e64ba0a36eae4f88f

    SHA512

    27c71e88b6966f81472ddebf0ced89956444c26fb6c368032bbbfabbc3cd94fd01ecd591a41064513c04b98ebe5d0fdf83b7fbc1a185fcd000b9da14eb16fe59

  • memory/484-53-0x0000000000020000-0x00000000000B9000-memory.dmp

    Filesize

    612KB

  • memory/484-52-0x0000000000020000-0x00000000000B9000-memory.dmp

    Filesize

    612KB

  • memory/484-51-0x0000000000020000-0x00000000000B9000-memory.dmp

    Filesize

    612KB

  • memory/484-50-0x0000000000020000-0x00000000000B9000-memory.dmp

    Filesize

    612KB

  • memory/484-49-0x0000000000020000-0x00000000000B9000-memory.dmp

    Filesize

    612KB

  • memory/484-43-0x0000000000020000-0x00000000000B9000-memory.dmp

    Filesize

    612KB

  • memory/484-44-0x0000000000020000-0x00000000000B9000-memory.dmp

    Filesize

    612KB

  • memory/1736-15-0x00000000009F0000-0x0000000000A71000-memory.dmp

    Filesize

    516KB

  • memory/1736-21-0x0000000000AB0000-0x0000000000B31000-memory.dmp

    Filesize

    516KB

  • memory/1736-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1736-0-0x0000000000AB0000-0x0000000000B31000-memory.dmp

    Filesize

    516KB

  • memory/2440-18-0x0000000000920000-0x00000000009A1000-memory.dmp

    Filesize

    516KB

  • memory/2440-42-0x0000000000920000-0x00000000009A1000-memory.dmp

    Filesize

    516KB

  • memory/2440-38-0x0000000003470000-0x0000000003509000-memory.dmp

    Filesize

    612KB

  • memory/2440-25-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2440-24-0x0000000000920000-0x00000000009A1000-memory.dmp

    Filesize

    516KB

  • memory/2440-19-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB