Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 22:03

General

  • Target

    4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe

  • Size

    426KB

  • MD5

    e4534a106609e33002824af2f536a937

  • SHA1

    29b956d5233e3b4f0b59382b53d798e1d1bce9df

  • SHA256

    4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953

  • SHA512

    4e9502bc121bfc303dbce61318a0d918d1850d5e1b1b2265ad0d524ffd2aec88a910919f7e644edbb3f8d8eaed66812259f6c6a1e78b29e16762b83e143f7258

  • SSDEEP

    6144:WzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOdsc:YU7M5ijWh0XOW4sEfeOD

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe
    "C:\Users\Admin\AppData\Local\Temp\4757153eaf5e3a0b2afcd1160b87c1d9a9e579aedabce52ffbd6c83969469953.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\obdem.exe
      "C:\Users\Admin\AppData\Local\Temp\obdem.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3128
      • C:\Users\Admin\AppData\Local\Temp\upxyg.exe
        "C:\Users\Admin\AppData\Local\Temp\upxyg.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4140
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    2e41ec5d0baa4ef76a82c0b0b1d8f58c

    SHA1

    6f93c7490b59dd92ed58e1406c0f8bdd156cb659

    SHA256

    8ee3c8ac0b8815d68bdc39a1eb9d95e253e74cbe6e482ae91511ccbe2dc8d548

    SHA512

    d27a2f296e27ae39cea7c8b12051dd6fd68ab932116235417db540d59fdad12e5522df52065f52c7bdbd2d85cb696e4f517347942aca876b8fad35b42faf0063

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    1e9f6ded2a91ab3befaa38215d9bdef7

    SHA1

    cbac9c447ad620ff8e94bcaa2505972f1d8ecd18

    SHA256

    feafd7ce26874b1c9b80daaea654499c1f14097a1430cf85340e4a53fe026a07

    SHA512

    2c629cef4c863dd541e5453423f9d2b793209b306449ce77ada131ab19a25f0aa8c12505c1d85569a18a6c0e3734baf8b2938b624142a482e1b0730cae70aed7

  • C:\Users\Admin\AppData\Local\Temp\obdem.exe

    Filesize

    426KB

    MD5

    b3588d2bddfdda5744314d2c8caa387c

    SHA1

    663a38e2fd1d98b7a724a842b994084b1a01035f

    SHA256

    cf9a3f57a3739ad626daf4d985e010635bea57e699d75b27809c95b085b6939d

    SHA512

    56d7ea6e7f230744f34b07e862dfe6e30ab2c98ab3bd91c3398134531d10cdd8c5002f9c9ccf3211628a88472567b1dbe65c4ea8eee8132e28265b9612d346c6

  • C:\Users\Admin\AppData\Local\Temp\upxyg.exe

    Filesize

    212KB

    MD5

    7d7a0834a5a3791dd9080a54179bd671

    SHA1

    371bb6d860fd9c2d12c3eed40eff9861f24aebd3

    SHA256

    087599f09c3289820d2d5789f2ffd1e4235fe7e011b4e8a32741bedced2016d9

    SHA512

    0db92a3aa5d5382f30d39e6464e61c6de15ba3329c45c2e35dc8a0fe443616c9965e34e58b0853e464ef3d9b04f4654c2cb0a59d38001422bc551948fb905b5a

  • memory/3128-25-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3128-16-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4140-24-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-29-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-28-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-27-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-31-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-32-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-33-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-34-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4140-35-0x0000000000C10000-0x0000000000CA4000-memory.dmp

    Filesize

    592KB

  • memory/4532-13-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/4532-0-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB