Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2024, 22:03

General

  • Target

    4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe

  • Size

    426KB

  • MD5

    e4534a106609e33002824af2f536a937

  • SHA1

    29b956d5233e3b4f0b59382b53d798e1d1bce9df

  • SHA256

    4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953

  • SHA512

    4e9502bc121bfc303dbce61318a0d918d1850d5e1b1b2265ad0d524ffd2aec88a910919f7e644edbb3f8d8eaed66812259f6c6a1e78b29e16762b83e143f7258

  • SSDEEP

    6144:WzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOdsc:YU7M5ijWh0XOW4sEfeOD

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe
    "C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\siliq.exe
      "C:\Users\Admin\AppData\Local\Temp\siliq.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\biwuv.exe
        "C:\Users\Admin\AppData\Local\Temp\biwuv.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    2e41ec5d0baa4ef76a82c0b0b1d8f58c

    SHA1

    6f93c7490b59dd92ed58e1406c0f8bdd156cb659

    SHA256

    8ee3c8ac0b8815d68bdc39a1eb9d95e253e74cbe6e482ae91511ccbe2dc8d548

    SHA512

    d27a2f296e27ae39cea7c8b12051dd6fd68ab932116235417db540d59fdad12e5522df52065f52c7bdbd2d85cb696e4f517347942aca876b8fad35b42faf0063

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    671a12a4110af3353387f82a65ce3e3e

    SHA1

    b2407f18ecc8401d86c2f5be0748e75bf08b4ffa

    SHA256

    896483b294f76ea2d11b9b2445a3722546af8df207ec612a110525e98f62169e

    SHA512

    e247c96ce97ab8c77b9d7e7470cc2607ed7c5667f250b88b6363d16fa864d862eec3c96f5a85fce7061cff56b61e55ca89b00ab23f5ba26e020a8bca205aaed9

  • \Users\Admin\AppData\Local\Temp\biwuv.exe

    Filesize

    212KB

    MD5

    f19c85d005e9ba58cdad7f47856e512f

    SHA1

    860f7d66e98ee7975ab0370b9f1d347707bd8101

    SHA256

    49f3fba11f3662b37a3e3ee2dbfc7ee695a4222b36a1cc2f634819d59ff9baf2

    SHA512

    d842cd497c97cc8636ed3587c89c281cbc87edd18238f3fc4aaf5e0d4d0a352888599c503dd51a628b092304ca6072567384e12a45d5002c89892b4ae006004b

  • \Users\Admin\AppData\Local\Temp\siliq.exe

    Filesize

    426KB

    MD5

    78d48a0e9b3194ac3ed1b618387796b1

    SHA1

    00f0e305d0cff58742232b50a30751fcd4fdaca6

    SHA256

    f970ba8b2849bda0a0e43f059a925727df5ba7af8e84f84d3adbc644b390e398

    SHA512

    06e4446df3400d6a0954a53cf9f86b9762798f3b3b68aefac1495d4fabc8600bd7675c13ebb412d76ab915335dfb7161c10c59456846ea89d065363874932662

  • memory/1624-40-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-41-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-33-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-42-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-39-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-32-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-38-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-35-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1624-34-0x0000000001270000-0x0000000001304000-memory.dmp

    Filesize

    592KB

  • memory/1972-29-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1972-30-0x0000000003B80000-0x0000000003C14000-memory.dmp

    Filesize

    592KB

  • memory/1972-23-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3044-0-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3044-20-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3044-11-0x00000000024D0000-0x0000000002537000-memory.dmp

    Filesize

    412KB