Analysis

  • max time kernel
    93s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 00:00

General

  • Target

    72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe

  • Size

    264KB

  • MD5

    e68b9afabc211e801788560b1e3c81db

  • SHA1

    a963e92f4db0ea49b7c512358c6c137aab1b6304

  • SHA256

    72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831

  • SHA512

    c7c39bdaae1ae83960755725956359423ade85943d54f6ea0cb57a2f1115e5b2716ae50a15b34b6c51d7c5ecf3050b19bfb5ad7e2f86c0269664eb5e87da00fc

  • SSDEEP

    3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANaI:ASeyGpTaesaQUufkL57YsL9NIx9ANaI

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe
    "C:\Users\Admin\AppData\Local\Temp\72510205ae8ba9782eb96fe83b2c7fb6c8b49696c32302c56be0fdfc3bb0e831.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4052
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    4514d58bb3af5fd2132870ab9e2897d9

    SHA1

    9bf67ec19026e2485416a37315a32a19972a69ff

    SHA256

    8bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8

    SHA512

    07941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    264KB

    MD5

    2d6958d98af55b826319fa1ee4755e45

    SHA1

    ee7679215c5a9f8f18f4e5ab96061480c8f87a89

    SHA256

    e8aca0ca8c7ac4c4a519cdacb7e3a13ab65acf3f33153f31a3f8827d503c2ebd

    SHA512

    0f30513eddde2e3855b11e72c11f7e660b6bef27ae0c85e8f4ebff8be6796016f752d1aae9e1b0c83888702733f0b9bf5dbafc70debc39ac39c11b5a1d7721d3

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    ac5deac1f3182ec87b592e20a7491a10

    SHA1

    9401081138e727384149838c3ef2c0e7fc7cdb6f

    SHA256

    c8c5b8a1cf677f252f16b5d16b39475fc964311b83bac4c2d33ecc8a59ec13a1

    SHA512

    d1bd8d83240351d315045396fbc89b0fd2d0c5f6ef6db1b4efa2ad2886c1168f4bb42191f60387d32740098fcf775363b9242defec949645dd5006e047160390

  • memory/1324-0-0x00000000002F0000-0x0000000000341000-memory.dmp

    Filesize

    324KB

  • memory/1324-14-0x00000000002F0000-0x0000000000341000-memory.dmp

    Filesize

    324KB

  • memory/4052-12-0x0000000000820000-0x0000000000871000-memory.dmp

    Filesize

    324KB

  • memory/4052-17-0x0000000000820000-0x0000000000871000-memory.dmp

    Filesize

    324KB

  • memory/4052-18-0x0000000000820000-0x0000000000871000-memory.dmp

    Filesize

    324KB