Analysis

  • max time kernel
    89s
  • max time network
    90s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2024 22:32

General

  • Target

    0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe

  • Size

    49KB

  • MD5

    84e63751dcce88297cfdae111ed1b020

  • SHA1

    7ede73c969958ad17f20e6edcd5f3908b92993f7

  • SHA256

    0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235

  • SHA512

    149401fe32f0a44bbef51e2186a18b8ef5c8e2dd85ca8d45c36b9258c5357115ca62423f357886e38711e0a35d83cdfe0a928ce1b549d901408b6ea32f456fa4

  • SSDEEP

    1536:834/PC7Ruz3hRXRASULZ6JKYdbzcmhCZnc:It7R8fU6n8c

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe
    "C:\Users\Admin\AppData\Local\Temp\0976fa202dbca5915c19b5c64ee52c0f412023ca5e36bf248af70b4d48938235N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\mokdhft.exe
      "C:\Users\Admin\AppData\Local\Temp\mokdhft.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1776
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    39e55c2b5135dd669ad371cc03d79fc2

    SHA1

    d027fea84a269f8e556dfb5411ac3d01b9311017

    SHA256

    ecf7b9f0150af34b1d09f4602f0acf31445ff28e40b2411b0e32180bb8672919

    SHA512

    e75942d900b97d254097d8a44bfde16bdc99cc0f124541316a0987b2fb5433b7b1f12d4eff8b47d05e9068e7a038e4dd92998646448dcb0d6615a81a561ef280

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    2f516ba1c97371c7f6b791315f6135a6

    SHA1

    1c9cf73fd90433578720021bd3d6ae5fce28102c

    SHA256

    8f856046d4360b3f1894a474256004e56f7b9d026a10673c541f8e1ef2b63c91

    SHA512

    2ac7712219c15fde3fadb4b70ebc7666378c5b58cb65ca5e11242676ba4cfdae08a6c6389ea1615d9c4013559188a126df78614d3e39007fedf31b71be1e3ca8

  • \Users\Admin\AppData\Local\Temp\mokdhft.exe

    Filesize

    49KB

    MD5

    d87708f16fb6372e1024cb2bb137e528

    SHA1

    81c5f180d1b8d7e8ae6a857a88c3f00e105f8ecc

    SHA256

    f904f260e1f38d93a67a80fc3c7fd1d61e4e9bc2f3f14fe858f0e289738d2783

    SHA512

    7f95a0283efe17ecfff8b9660cde23780c19bd40f79a08b00de4ba92ed2c9b008eeb9abdc7599589a460d7f2daa871aee6e3ad938b14d747b2f26d5629e90f7c

  • memory/1736-0-0x00000000011F0000-0x0000000001223000-memory.dmp

    Filesize

    204KB

  • memory/1736-8-0x0000000000D40000-0x0000000000D73000-memory.dmp

    Filesize

    204KB

  • memory/1736-19-0x00000000011F0000-0x0000000001223000-memory.dmp

    Filesize

    204KB

  • memory/1776-17-0x0000000000800000-0x0000000000833000-memory.dmp

    Filesize

    204KB

  • memory/1776-22-0x0000000000800000-0x0000000000833000-memory.dmp

    Filesize

    204KB

  • memory/1776-24-0x0000000000800000-0x0000000000833000-memory.dmp

    Filesize

    204KB

  • memory/1776-31-0x0000000000800000-0x0000000000833000-memory.dmp

    Filesize

    204KB