Analysis

  • max time kernel
    89s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 00:27

General

  • Target

    dd1ae913f25c042958c763b0ab72485868230085d7e3131dc76dbebbf0b132c7N.exe

  • Size

    167KB

  • MD5

    c9bc2f653a9dd035d8569be6b02ffe20

  • SHA1

    3ef6cbc86a9ce7b2ef415462920c1b8818d8b398

  • SHA256

    dd1ae913f25c042958c763b0ab72485868230085d7e3131dc76dbebbf0b132c7

  • SHA512

    ae0e60ccf65796d9cc6c18fe2239cab23d954b72f51a3bfb6a8983439d289c92d0744420ebb2c4ba3e911414a99ad92861382df3cff027792bd4bc820ec37aa1

  • SSDEEP

    1536:P0jMVO8LWbp4Zt/kvT2/AWbAoUETLKyUGDeF3eP8UVuC65RG08AU8f5fqeLl:P0jLTp4biALbUGcC65Q08Ak+l

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.208

112.175.88.207

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd1ae913f25c042958c763b0ab72485868230085d7e3131dc76dbebbf0b132c7N.exe
    "C:\Users\Admin\AppData\Local\Temp\dd1ae913f25c042958c763b0ab72485868230085d7e3131dc76dbebbf0b132c7N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1264
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    dd1155cbc9956e5dbeee97b18e3c4c5a

    SHA1

    e5f61bc0d1bc9ad93206ea16ddefca0900ea780c

    SHA256

    53be558f961cb503bea4e622d7833128bb01c698cc3cc6d3ec9b1cf1bafe72b7

    SHA512

    1e384513a0d2bb4d797d714f93afdf69efb2be05217fd6b5f421fc3f776ec89431b20d5a82e731d7d78c7d4f8fae3ab49880b524844b3c5e16281fa83d00a1ce

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    5de648e8d2ec05027c7243c1b9be69df

    SHA1

    acb50ca87fc1eb296e1a242ea4072d5d326b68c7

    SHA256

    7722f746101997b8b24e6e72d972429e36ed0e1b605b9b616de2c8d6ace4a69a

    SHA512

    e05f5355f9e0230a697e158d2cc3696555babb814c13a72d1e729ade82254d5a2485be8535e1906d1e57595a53e586a89ad3406915257c0c57a5940212549e35

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    167KB

    MD5

    25817951cd02d3ee992fab3f51da4ae5

    SHA1

    6233583e0a66e67e36d14e786717ae13c40e7670

    SHA256

    d196f84556ad39789bbd39f54a7b48973a79dd8c5624194363889cfd4eba8a43

    SHA512

    9dab19e581a2100bcd046774ef8d58164c50e87629163fa92d6223dcbc48c8face4f983d4bee5c5e79ffd82cc27305b66245f82496ade8ec56375580054ba452

  • memory/1264-10-0x0000000000880000-0x00000000008B1000-memory.dmp

    Filesize

    196KB

  • memory/1264-21-0x0000000000880000-0x00000000008B1000-memory.dmp

    Filesize

    196KB

  • memory/1264-22-0x0000000000880000-0x00000000008B1000-memory.dmp

    Filesize

    196KB

  • memory/3036-0-0x0000000001380000-0x00000000013B1000-memory.dmp

    Filesize

    196KB

  • memory/3036-8-0x0000000000500000-0x0000000000531000-memory.dmp

    Filesize

    196KB

  • memory/3036-18-0x0000000001380000-0x00000000013B1000-memory.dmp

    Filesize

    196KB