Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 03:21

General

  • Target

    13e083e73c0c9b10417abb2f235642c34987b306e8184f48ed09b8f8238be398N.exe

  • Size

    332KB

  • MD5

    d4dc0d308df5e95206a3996e1826e0f0

  • SHA1

    11d31cdf3db5943ad568af9beb1ea22138a29ecf

  • SHA256

    13e083e73c0c9b10417abb2f235642c34987b306e8184f48ed09b8f8238be398

  • SHA512

    3a12527907ea4a9a10bffb8401dc3218c58a29e7e0782bfde678b99f327dd5f99b506fef43e15d7927aea1e44515e14375f240226f22fff1e20ac5355234c092

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVj:vHW138/iXWlK885rKlGSekcj66ciEj

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13e083e73c0c9b10417abb2f235642c34987b306e8184f48ed09b8f8238be398N.exe
    "C:\Users\Admin\AppData\Local\Temp\13e083e73c0c9b10417abb2f235642c34987b306e8184f48ed09b8f8238be398N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\gozyn.exe
      "C:\Users\Admin\AppData\Local\Temp\gozyn.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Users\Admin\AppData\Local\Temp\buriy.exe
        "C:\Users\Admin\AppData\Local\Temp\buriy.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2412
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    342B

    MD5

    b894925e57c9f98debe0a09b905518fe

    SHA1

    68c2149448f56c2057df9ef76fd227a18b9d39bc

    SHA256

    8ffdf586ab3ce73a65dd5548babe3b33cc4fbd3a941fb975cd821a9027f42783

    SHA512

    0b97ccd3521fc66080efaf5e8b7249f6dd8fbfb993c1ad50bca12240d40a11f5f15251b21dbe8f8563d701d9481576d4c0df121ae58017e1fe3f845c38d22b29

  • C:\Users\Admin\AppData\Local\Temp\buriy.exe

    Filesize

    172KB

    MD5

    69fb1380b948b9f08cf293345a95ed55

    SHA1

    e3ef4af483dd3f3712e80e960a87945950520e40

    SHA256

    b4293590e6f8db7d08110ebd72ced83742f4c0138e735702f3d4a0c209132be4

    SHA512

    d26100b64a185d4c4e450e136699b369e285e5820b48cb10043e97cbea3f5bb2369090bac7b55710f740489c82ffd5f1382e60facff7531d136fc5ef692b2746

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    5591050b58216c5ae653b9f5243837e2

    SHA1

    5cb7b1c011347cf647c2b538c8aec0162a3c3c54

    SHA256

    c554aa66af9ca12915b24eb8b40ec61db4e12a8a622259bf309b6a74ba7c8306

    SHA512

    5bf0f45954831145fae3482dd706ac0c4ea338667c84a8beb99d4ed4f7ad5c01bdb093a15e22b40662df92682b8e5924671cfdf6910a1c8c5ead8ef056973458

  • C:\Users\Admin\AppData\Local\Temp\gozyn.exe

    Filesize

    332KB

    MD5

    9c62a667c80b1753aa8b527be4d7d4cd

    SHA1

    7a1b5f4f4c8e09f0b1e4aad5142382ba0602b1e9

    SHA256

    03eb0b93dc275e5f2d0ff3186c2c82be41a1ac6116b84ea858ad1956217a2867

    SHA512

    4dcc7b89e98aa9c0ce4d0cbbcada31af42fa5a54ad76abe085b0e99438a19888f31b622c0bfda1e3fdc3207f77e3eb896add800b1f7c10a059de53d329ed2f29

  • memory/1892-20-0x0000000000020000-0x00000000000A1000-memory.dmp

    Filesize

    516KB

  • memory/1892-13-0x0000000000020000-0x00000000000A1000-memory.dmp

    Filesize

    516KB

  • memory/1892-14-0x0000000000B40000-0x0000000000B41000-memory.dmp

    Filesize

    4KB

  • memory/1892-43-0x0000000000020000-0x00000000000A1000-memory.dmp

    Filesize

    516KB

  • memory/2404-17-0x00000000009A0000-0x0000000000A21000-memory.dmp

    Filesize

    516KB

  • memory/2404-0-0x00000000009A0000-0x0000000000A21000-memory.dmp

    Filesize

    516KB

  • memory/2404-1-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

    Filesize

    4KB

  • memory/2412-38-0x00000000000E0000-0x0000000000179000-memory.dmp

    Filesize

    612KB

  • memory/2412-40-0x00000000000E0000-0x0000000000179000-memory.dmp

    Filesize

    612KB

  • memory/2412-41-0x0000000000540000-0x0000000000542000-memory.dmp

    Filesize

    8KB

  • memory/2412-45-0x00000000000E0000-0x0000000000179000-memory.dmp

    Filesize

    612KB

  • memory/2412-46-0x00000000000E0000-0x0000000000179000-memory.dmp

    Filesize

    612KB

  • memory/2412-47-0x00000000000E0000-0x0000000000179000-memory.dmp

    Filesize

    612KB

  • memory/2412-48-0x00000000000E0000-0x0000000000179000-memory.dmp

    Filesize

    612KB

  • memory/2412-49-0x00000000000E0000-0x0000000000179000-memory.dmp

    Filesize

    612KB