Analysis

  • max time kernel
    89s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 01:42

General

  • Target

    2e93646628b40f58c922acce788aacffde92a56d46b46c5f961b27f8223f0b83.exe

  • Size

    80KB

  • MD5

    73bcc554d3834863dde8d35fe335a85a

  • SHA1

    8957eab9e5bc42f0968f45b78c058682d5cd571d

  • SHA256

    2e93646628b40f58c922acce788aacffde92a56d46b46c5f961b27f8223f0b83

  • SHA512

    c68884504f9c267079aeed489b3cd286011d06bb51f0ec9e56d7c9dd46bda5f76d6518fa0024ce48926f1879144151dab264d29878d3357084b8505523ab396e

  • SSDEEP

    1536:UOzC0tKyIy9nOM8e5rqYJkdpzCEw2dnU4qvF:UO9Ro2rqYyXzCEwGA

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e93646628b40f58c922acce788aacffde92a56d46b46c5f961b27f8223f0b83.exe
    "C:\Users\Admin\AppData\Local\Temp\2e93646628b40f58c922acce788aacffde92a56d46b46c5f961b27f8223f0b83.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2524
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    6e0ecec5e285ac121f1bf7f3a59ce016

    SHA1

    d432c8dd0bd3ddfffaa5a22a74c6da08172c13d7

    SHA256

    c1df717fda579031c64433ccadbc1e471654b843121f07f4066b7793355e2dfe

    SHA512

    9c20f07807c92a4bd1808deb68e571fd0ea26f39b6033c8f9e40c0346267aae396ba4ceac427c2daf95d855cca22f05aaeb7ad4f93bd8289972816a55d69527d

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    80KB

    MD5

    5fbf938ad191918343ab06e804072a8a

    SHA1

    3ce191851b15a39c3d80e4b51e56bf993a036b75

    SHA256

    5c68e926d8d0336c9abde8b21cd05bd8955fa2bf3668afa34abff26abb1c2066

    SHA512

    b3e06c3f20bafde8d0ff81ba6b760d0603cbc6a8a46f2bd20bee2b3381f09fca4771b6500f66e2a3c2167611d33cff7d9d4e5ddb16135a4e9684ca95bb4a8e29

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    00b8396f395cca7e6a25c49264b49f7c

    SHA1

    2d02cc36880ac781a97cc606a78b909acdb99e51

    SHA256

    4568ea0463fac75adaf83ada45b65f3f41e958d4bd4dfb21590c7611b67caac4

    SHA512

    58f44fcc6acc1f41a034fed3ab58e23872f2003169db107708d50653319e232fea370ce760fcc3707921cd5a7d6d7d043e2d74321778a0ac4bff42269ea29369

  • memory/2524-10-0x00000000012C0000-0x00000000012FC000-memory.dmp

    Filesize

    240KB

  • memory/2524-21-0x00000000012C0000-0x00000000012FC000-memory.dmp

    Filesize

    240KB

  • memory/2524-24-0x00000000012C0000-0x00000000012FC000-memory.dmp

    Filesize

    240KB

  • memory/2524-31-0x00000000012C0000-0x00000000012FC000-memory.dmp

    Filesize

    240KB

  • memory/3056-0-0x0000000000CD0000-0x0000000000D0C000-memory.dmp

    Filesize

    240KB

  • memory/3056-9-0x0000000000B40000-0x0000000000B7C000-memory.dmp

    Filesize

    240KB

  • memory/3056-18-0x0000000000CD0000-0x0000000000D0C000-memory.dmp

    Filesize

    240KB