Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 01:26

General

  • Target

    7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe

  • Size

    332KB

  • MD5

    e5f8cc34c92ec51b668f856467e5d249

  • SHA1

    aa954ce38e44d15e8519af2a28ae70a3f69caed0

  • SHA256

    7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48

  • SHA512

    27aeaecff813fb2902e42480dba7b57a1f6adb29daa78aa9f23c0ead88db07e53fc9476c731488c08db81b151111dc91c8bf2e8e04a525c0959a0febb774a546

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66ciX

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe
    "C:\Users\Admin\AppData\Local\Temp\7eb00e0edfdbe229b0a1367ee113c3cd8d10f7d10010b6f65b0c3478d7dbdf48.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\AppData\Local\Temp\loecu.exe
      "C:\Users\Admin\AppData\Local\Temp\loecu.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Local\Temp\weocz.exe
        "C:\Users\Admin\AppData\Local\Temp\weocz.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4588
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    c7811635d9753612a28ef415be1223f1

    SHA1

    09aa5099ae2977f728692cf9d6f6cbe30d195e95

    SHA256

    8239d4347928a15f77a4eae63c8beedc56f6fe068bfd05b43016a7c299188648

    SHA512

    0bab62e6764cd02aa03142aa6fee342a61ac6853e2bb3eadecd1aa20134339449a54e705ef378f16231cc09d1cad89694cbbf9afa75cfa39198a76aa54104247

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    9722b94808196ad6741571b09c5b3f30

    SHA1

    13d133f36383413d3532b499b5328df422f1924d

    SHA256

    141cf1b727ae76ef905a2bedad539f6dc3a99b0cc342a4bbf1d755b4f62c0977

    SHA512

    dfc7607889f4cbec1adfc67869148da0098dcaf70d1268895cab47b5f0f9132f24b2f6f7c193adbdb691d6b8d753c9d240faa305fd8f6a6f768ea3bd278f8347

  • C:\Users\Admin\AppData\Local\Temp\loecu.exe

    Filesize

    332KB

    MD5

    e1e07e0bb29895aca85114d4c0ed2d41

    SHA1

    87e4066f31453c7fafc4f3a5af9f5e8dce25093d

    SHA256

    7fbee2ea6334e0b42f080c8ce64bf4a317a02cd13090d27eead7a38a9b3284ae

    SHA512

    80b801f6bb85ecdab86929c22fa947c34e17309cefc8c8238fdaa0929e84192101e7c52773d374c2891424fcd84623c15d58b9ab463b0056362e326910bde90f

  • C:\Users\Admin\AppData\Local\Temp\weocz.exe

    Filesize

    172KB

    MD5

    2a9f2a165dbe872a41ccdf7c3aedbc3b

    SHA1

    3590c0beba0e15e20658c29058712be99eef768d

    SHA256

    22389b440c608103a0a7a569cd402a496314ab0dd37abd04b45284f7d23d01dc

    SHA512

    4592c2fd62b828eddf20f46427d0e9a7cb2892e46de6bf01e95cb23d27a4e23d4454d3492e23ea0b2e9a49181db88f0a477f8e3c57c03eb5d758261f54380726

  • memory/2272-20-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2272-43-0x00000000004A0000-0x0000000000521000-memory.dmp

    Filesize

    516KB

  • memory/2272-14-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2272-11-0x00000000004A0000-0x0000000000521000-memory.dmp

    Filesize

    516KB

  • memory/2272-19-0x00000000004A0000-0x0000000000521000-memory.dmp

    Filesize

    516KB

  • memory/4588-45-0x0000000001360000-0x0000000001362000-memory.dmp

    Filesize

    8KB

  • memory/4588-39-0x0000000000990000-0x0000000000A29000-memory.dmp

    Filesize

    612KB

  • memory/4588-38-0x0000000001360000-0x0000000001362000-memory.dmp

    Filesize

    8KB

  • memory/4588-37-0x0000000000990000-0x0000000000A29000-memory.dmp

    Filesize

    612KB

  • memory/4588-46-0x0000000000990000-0x0000000000A29000-memory.dmp

    Filesize

    612KB

  • memory/4588-47-0x0000000000990000-0x0000000000A29000-memory.dmp

    Filesize

    612KB

  • memory/4588-48-0x0000000000990000-0x0000000000A29000-memory.dmp

    Filesize

    612KB

  • memory/4588-49-0x0000000000990000-0x0000000000A29000-memory.dmp

    Filesize

    612KB

  • memory/4588-50-0x0000000000990000-0x0000000000A29000-memory.dmp

    Filesize

    612KB

  • memory/4788-16-0x0000000000690000-0x0000000000711000-memory.dmp

    Filesize

    516KB

  • memory/4788-1-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/4788-0-0x0000000000690000-0x0000000000711000-memory.dmp

    Filesize

    516KB