Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 21:00

General

  • Target

    31f07747ce71885358dd49f3416aca8290a6684ba699a8ad97448819ce3c467d.exe

  • Size

    62KB

  • MD5

    7418f5d7e50d9b410c0ac7baec9a894b

  • SHA1

    bdca1455fbca27f4dd183d761ff63c3023f55c67

  • SHA256

    31f07747ce71885358dd49f3416aca8290a6684ba699a8ad97448819ce3c467d

  • SHA512

    bc370d63876c37c1295542d49bb697977a30137dde340e4b748d75f72a3c2d921e9d7ac89311fffb0e203b214f4739e524d638bbe9f65bc4bd1d299c2749bbd4

  • SSDEEP

    1536:saTkcl2v/z0thjkh6+uYLo31d0JuPrROVT:Jo0cAthu6+FQ0JuPkT

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31f07747ce71885358dd49f3416aca8290a6684ba699a8ad97448819ce3c467d.exe
    "C:\Users\Admin\AppData\Local\Temp\31f07747ce71885358dd49f3416aca8290a6684ba699a8ad97448819ce3c467d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2724
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    657ce9e5dd337971e44dfb9cb3fbf7dd

    SHA1

    026734083afaa4b7d298781b26a72ac9b67ac831

    SHA256

    3138d6a5526aaa3cb120adb309f2a27d5fec03c8aa088268a1c7f378dd722472

    SHA512

    79aab9648bb19ebe5946dd9edd7e11a70ea7b340a1c7539ccff3d3d13de2932bf5ea9077c079208e09bf5d632f00541e52d4926c5c80f86741effb8d86acd26d

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    14da6248c71a3843ac1a2bbb2c4aedc4

    SHA1

    247cf47afbd92a7ebcf7f6584679af11cdf681db

    SHA256

    0b11eb7fca80c7f18e3a859fd9f45a6cf0f2d59bc9fb088cb44ee8d1e9505d8c

    SHA512

    c8d705aa586ab3977a2e873f8be355a74295e5a72214390892fd1870868b266c675fce2e5675877346b7097d7203fdecd8b16efd85c72b057c09be1851e08208

  • \Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    62KB

    MD5

    fd47fe156015358345bdeb07151d8631

    SHA1

    b7c9b7d7fbb79d38796d7b1fe3d952383d19ca97

    SHA256

    ef6e25f640dc987119ce4fce0695fa9d3fde03ae4bd47e6fc3fd702e65f74399

    SHA512

    271d03ace9edcd224724c28adf20b37f9521219aeb33aedfc29386b3e7a5c773873039c55217269c1f8f9588bbfa54e1dd24d51d9fdcc5a1866474d4af2e834b

  • memory/2616-0-0x0000000000040000-0x0000000000065000-memory.dmp

    Filesize

    148KB

  • memory/2616-6-0x00000000003D0000-0x00000000003F5000-memory.dmp

    Filesize

    148KB

  • memory/2616-19-0x0000000000040000-0x0000000000065000-memory.dmp

    Filesize

    148KB

  • memory/2724-10-0x0000000000FD0000-0x0000000000FF5000-memory.dmp

    Filesize

    148KB

  • memory/2724-22-0x0000000000FD0000-0x0000000000FF5000-memory.dmp

    Filesize

    148KB

  • memory/2724-24-0x0000000000FD0000-0x0000000000FF5000-memory.dmp

    Filesize

    148KB

  • memory/2724-31-0x0000000000FD0000-0x0000000000FF5000-memory.dmp

    Filesize

    148KB