Analysis

  • max time kernel
    89s
  • max time network
    78s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 06:21

General

  • Target

    56a74e83d8e3c75a7bcc8d96a62e8888acc28e70bb83b41e0227a2f03e0e9313N.exe

  • Size

    168KB

  • MD5

    c4fd1a2a1454b47763044537512fc850

  • SHA1

    f1b765caafc9383770589afa294ce6001cce30f9

  • SHA256

    56a74e83d8e3c75a7bcc8d96a62e8888acc28e70bb83b41e0227a2f03e0e9313

  • SHA512

    548c90238039fa7c5b59e99310142eb25205cac2ae6ac0084fbb205796ea3f9a6db6d2b97dc0d90b0717b3693d8bc15fdf8c7399016e2794b30a1bbd99a5d09d

  • SSDEEP

    1536:eADA0Wbt1931D2P7BWLQ4zR4LUKMcPHFE3HP/GTW65CGEgvpxyTf/K:eADA0Wc7UJ6LZMaHLW65DE8pxWq

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.208

112.175.88.207

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56a74e83d8e3c75a7bcc8d96a62e8888acc28e70bb83b41e0227a2f03e0e9313N.exe
    "C:\Users\Admin\AppData\Local\Temp\56a74e83d8e3c75a7bcc8d96a62e8888acc28e70bb83b41e0227a2f03e0e9313N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2468
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    e9bde5b44e2cc18d88ff2ee2dbc7081c

    SHA1

    b2eba2136f52d53ff3f60541bc79e7b217d0b268

    SHA256

    53c25f3ea9f537bb7d5accae21cbc5c9ef83e4bdf52143201ab08b69403b489c

    SHA512

    573357570a89779fc2984dcc70639460bc8d0cfc6d3a0a37d0623a5804630e804b34671b0f98765b9f7a68b04aa550ffbfd9ca69f6157cff1c826466943bfc8c

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    c69ab3dd3d74ed523e368c9631add662

    SHA1

    af4d4a37751b4df211e1c2b1ef77988dc4564eb5

    SHA256

    b3e30a46b40014a4e32190cefcf83ff5cc3f1ff522bf066d9ce3237bf8f74850

    SHA512

    d850df577fa2146c8c224d6e97439ab845a1e6c97b718b6873258c260aa59bcb8ac56d15f06a0b8b7af75cb4677f34723ff42fa4c10b16788ea627b8238fb1b8

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    168KB

    MD5

    91813bf8a9209715e879e7f454d83fab

    SHA1

    f03b7c8298c71119899250e595c4cd8855990ba6

    SHA256

    2b193aea648869d7f5388b11726eea85046343c16924cb822e6bad510e948eb2

    SHA512

    367fb9c780c9da7017cccffd435d2788ce549c37673d73d64b5cdc6b2cd637724b320014b7367638d217750cdd66a32d27339610f7ab34bf1fcc40d413e8f0f9

  • memory/1852-0-0x0000000001150000-0x0000000001180000-memory.dmp

    Filesize

    192KB

  • memory/1852-6-0x00000000009B0000-0x00000000009E0000-memory.dmp

    Filesize

    192KB

  • memory/1852-18-0x0000000001150000-0x0000000001180000-memory.dmp

    Filesize

    192KB

  • memory/2468-10-0x00000000002D0000-0x0000000000300000-memory.dmp

    Filesize

    192KB

  • memory/2468-21-0x00000000002D0000-0x0000000000300000-memory.dmp

    Filesize

    192KB

  • memory/2468-22-0x00000000002D0000-0x0000000000300000-memory.dmp

    Filesize

    192KB