Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 01:21

General

  • Target

    7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe

  • Size

    332KB

  • MD5

    e5f8cc34c92ec51b668f856467e5d249

  • SHA1

    aa954ce38e44d15e8519af2a28ae70a3f69caed0

  • SHA256

    7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48

  • SHA512

    27aeaecff813fb2902e42480dba7b57a1f6adb29daa78aa9f23c0ead88db07e53fc9476c731488c08db81b151111dc91c8bf2e8e04a525c0959a0febb774a546

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66ciX

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
    "C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Users\Admin\AppData\Local\Temp\ynyni.exe
      "C:\Users\Admin\AppData\Local\Temp\ynyni.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\susoe.exe
        "C:\Users\Admin\AppData\Local\Temp\susoe.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5092
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    c7811635d9753612a28ef415be1223f1

    SHA1

    09aa5099ae2977f728692cf9d6f6cbe30d195e95

    SHA256

    8239d4347928a15f77a4eae63c8beedc56f6fe068bfd05b43016a7c299188648

    SHA512

    0bab62e6764cd02aa03142aa6fee342a61ac6853e2bb3eadecd1aa20134339449a54e705ef378f16231cc09d1cad89694cbbf9afa75cfa39198a76aa54104247

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    2b6dcaab060467aedd526706630624a9

    SHA1

    97611b2c6b2e5fed3a428080cd3e83531ab38d4e

    SHA256

    bfdaaff98fedc99b98c777a96597ee2c09105c87cd7de5f7eec260647a74f58e

    SHA512

    e880002aaf0d7601c5e27bc3867de7a139c8ac320f4a50f18e7e5c3a1066fac1487709d6ccc7add689e4fa2b76615f0dc1811fe56174f963f68e13dbdfa5aeb3

  • C:\Users\Admin\AppData\Local\Temp\susoe.exe

    Filesize

    172KB

    MD5

    5b0d48b11a55585a392af79cb503b0ad

    SHA1

    44cd81bdc08925f50e4a71c3baf2c1b63c04d998

    SHA256

    bf3b2619c111d3ebc5b4f93d4e181551574c9b41e1d904c5c1847564e7de195f

    SHA512

    c87dc08df0a1d879102c4f32e3fe26f709bd213f5d3140e3416c49e7cc33265dc6c64826d335f951c1cc0245f64f0b020bb40c1fe5a42268c5008e77cbd670b1

  • C:\Users\Admin\AppData\Local\Temp\ynyni.exe

    Filesize

    332KB

    MD5

    1e4cf8430fa101652a6ef82327a2f99d

    SHA1

    0fee9ee241dc41de882b7cf52943cf1c47cbb4ec

    SHA256

    48fdff162493e6ef8dc36eda391f1eccfb4fdb4db65a9c92d277e36b4b1fbdb5

    SHA512

    8f634378f8206cd959d6593e42ceb443c0daa716753582c1ce48363e27e81af035c892f6895ef23942cbf138ed0dc1ac943967d4f41f5d593bc46485f6016836

  • memory/2020-20-0x0000000000D30000-0x0000000000DB1000-memory.dmp

    Filesize

    516KB

  • memory/2020-37-0x0000000000D30000-0x0000000000DB1000-memory.dmp

    Filesize

    516KB

  • memory/2020-14-0x0000000000FC0000-0x0000000000FC1000-memory.dmp

    Filesize

    4KB

  • memory/2020-13-0x0000000000D30000-0x0000000000DB1000-memory.dmp

    Filesize

    516KB

  • memory/4312-17-0x0000000000630000-0x00000000006B1000-memory.dmp

    Filesize

    516KB

  • memory/4312-0-0x0000000000630000-0x00000000006B1000-memory.dmp

    Filesize

    516KB

  • memory/4312-1-0x00000000007C0000-0x00000000007C1000-memory.dmp

    Filesize

    4KB

  • memory/5092-38-0x0000000000C20000-0x0000000000CB9000-memory.dmp

    Filesize

    612KB

  • memory/5092-40-0x0000000000C20000-0x0000000000CB9000-memory.dmp

    Filesize

    612KB

  • memory/5092-43-0x00000000005F0000-0x00000000005F2000-memory.dmp

    Filesize

    8KB

  • memory/5092-45-0x0000000000C20000-0x0000000000CB9000-memory.dmp

    Filesize

    612KB

  • memory/5092-46-0x0000000000C20000-0x0000000000CB9000-memory.dmp

    Filesize

    612KB

  • memory/5092-47-0x0000000000C20000-0x0000000000CB9000-memory.dmp

    Filesize

    612KB

  • memory/5092-48-0x0000000000C20000-0x0000000000CB9000-memory.dmp

    Filesize

    612KB

  • memory/5092-49-0x0000000000C20000-0x0000000000CB9000-memory.dmp

    Filesize

    612KB