Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 01:43

General

  • Target

    7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe

  • Size

    332KB

  • MD5

    13992396b49c6e96678bffe09a3b8cb0

  • SHA1

    49a6b856d8be5ed9e7e5835545a640f559f5b114

  • SHA256

    7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192

  • SHA512

    5f38620cf2f423eb73b2aa323ae82c7ca51903f9456f5a2994a5960db7ce5cbebe5c89de9c3f4285487ccb0b872b7724a42a4189da5240624418831458f61f30

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYU:vHW138/iXWlK885rKlGSekcj66ciB

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe
    "C:\Users\Admin\AppData\Local\Temp\7be73d7c24505fcd9e20d4b1cf83d24cc5036cc0fb25fc2dd15feffb4d05e192N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\zydum.exe
      "C:\Users\Admin\AppData\Local\Temp\zydum.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Users\Admin\AppData\Local\Temp\miluk.exe
        "C:\Users\Admin\AppData\Local\Temp\miluk.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3392
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    342B

    MD5

    72cf3be34e2def38ded4e5de41ad1c36

    SHA1

    b05f8a4e1443014527616972c605afad11326bea

    SHA256

    8d17bab488d97db4cd55ffb3b62deb5eaed6dca58dfa797ba2c43bd734dbd725

    SHA512

    e5fb259d814a1b4bcbbc833a27e439c5346b9aa084758be38097e3a9abbeb0676bb11ca912b398633a43e11b34ec802b2c930d8f9f5eed30d1305b4131706da2

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    64bebb71ef97c819e093b2c1e83c48b6

    SHA1

    5dbe22ac6d7f7ca8e9d09cc19d83bd67e5fb143e

    SHA256

    31082fc5ee2cd25854e9dad10473a3dc6ca2c1fd7dbd6ff47f6e8b8abeffcb90

    SHA512

    48c602d03121b859412091d2de50301610f81539bb36d7cfd4c8814baefc18bbdac7406e23117265bdda61f88e25a88862178aa28cfd1d3baeeb99947209628c

  • C:\Users\Admin\AppData\Local\Temp\miluk.exe

    Filesize

    172KB

    MD5

    40bd5df3e97d00394469f39e3208b425

    SHA1

    8ae5fef90648ef8536317724cca4ca7286daf29e

    SHA256

    89df8247ac45afb34a44e842e99587bc8dd0cb5561b2ac2ea9648e23aa14e519

    SHA512

    2b7366369d0ee5152df8337a8ec674a819225ac4f48c4e23a40d714c7df89db7461fd7cf0bdc8ae9873f5a69b8f7b817f3f191d95ddcd52d7bf0c5f953141be6

  • C:\Users\Admin\AppData\Local\Temp\zydum.exe

    Filesize

    332KB

    MD5

    e995209ce7675dec62a776e2c493854a

    SHA1

    7a94e9c930bd5523d7da5b62e2a254ab27110537

    SHA256

    ce1d75231c16695ef96068a9fe645d357e2921700fc5e0149fecf971b7293967

    SHA512

    641e366a9c3512facdb80ca4bbc595067b4859b68cdd653fd959d057780108d760d5f17dcf464ca2e6ef01bf29603f47a26943f2fa855e44d837124ed9f72075

  • memory/3392-47-0x0000000000C80000-0x0000000000C82000-memory.dmp

    Filesize

    8KB

  • memory/3392-48-0x00000000000F0000-0x0000000000189000-memory.dmp

    Filesize

    612KB

  • memory/3392-51-0x00000000000F0000-0x0000000000189000-memory.dmp

    Filesize

    612KB

  • memory/3392-50-0x00000000000F0000-0x0000000000189000-memory.dmp

    Filesize

    612KB

  • memory/3392-49-0x00000000000F0000-0x0000000000189000-memory.dmp

    Filesize

    612KB

  • memory/3392-46-0x00000000000F0000-0x0000000000189000-memory.dmp

    Filesize

    612KB

  • memory/3392-40-0x00000000000F0000-0x0000000000189000-memory.dmp

    Filesize

    612KB

  • memory/3392-38-0x00000000000F0000-0x0000000000189000-memory.dmp

    Filesize

    612KB

  • memory/3392-39-0x0000000000C80000-0x0000000000C82000-memory.dmp

    Filesize

    8KB

  • memory/4664-44-0x0000000000990000-0x0000000000A11000-memory.dmp

    Filesize

    516KB

  • memory/4664-21-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/4664-20-0x0000000000990000-0x0000000000A11000-memory.dmp

    Filesize

    516KB

  • memory/4664-13-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/4664-12-0x0000000000990000-0x0000000000A11000-memory.dmp

    Filesize

    516KB

  • memory/4804-1-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/4804-0-0x0000000000A80000-0x0000000000B01000-memory.dmp

    Filesize

    516KB

  • memory/4804-17-0x0000000000A80000-0x0000000000B01000-memory.dmp

    Filesize

    516KB