Analysis

  • max time kernel
    89s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 01:12

General

  • Target

    66fa0442e1c3091916a48ccb90a5cc141cc00add8a1235b6a71422dd114a988a.exe

  • Size

    55KB

  • MD5

    5bb4304841ab726ef0a7ac1acc240ac5

  • SHA1

    99b0cb5f3769e5c88b1f816c75e831669d8ca719

  • SHA256

    66fa0442e1c3091916a48ccb90a5cc141cc00add8a1235b6a71422dd114a988a

  • SHA512

    31e2dee40e1970b729a1ec673d9db0b4e4585478e4f6b533763a6c0cad8639a310294b34b2b7273793a08879ab807e32bd46be8e07d3827ef6c31f60b84a59aa

  • SSDEEP

    1536:qw788avzI+on+TqOK0cHMqtzMLvWsrupwnTf1GqT7K:qwda7KVr0cHneunw1K

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66fa0442e1c3091916a48ccb90a5cc141cc00add8a1235b6a71422dd114a988a.exe
    "C:\Users\Admin\AppData\Local\Temp\66fa0442e1c3091916a48ccb90a5cc141cc00add8a1235b6a71422dd114a988a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2312
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    0750e4580a3e9076e82bdc6ad33ba927

    SHA1

    b1e526b3833feda0e3b0738c6865fdac6360bf07

    SHA256

    74428e568204ea0d1c31570864cb96b1c2b672880f7575220957bf5fc2b24d89

    SHA512

    303b2cb8e644b336d7bf0892eadc84b414afdc41216719721aa0cf27fc18ecea1a2e943f07813c41d55c4166e489f89ec61a4fcead679ed3de8b323ecb42a8d9

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    6d82a70706fce362aeb99969bb736dc0

    SHA1

    103744fa674a3dee484eb1643c0919ba3aaf729a

    SHA256

    d23d89dc05fcca0edeae84fd9096f82d835ffc3fa18336fd09e7b447e65cc73d

    SHA512

    47e3d78e39991d2ca69de5c7aaaea813bad60eee6f85ed7ffc2953bc3d621fcee6c5f1c02eb406e79c767de2f22d0f252759ca842a1b8475b84389512d4a1629

  • \Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    55KB

    MD5

    285df8cad8f96dd3c8796c6c12077ce5

    SHA1

    a64dc6c0fa5109daded101799bde610f43c03129

    SHA256

    41dbfcc71afed5e2c89c828de5649d654358bbfab61207d21a12f2b4a7fbfe19

    SHA512

    94e0d0f477c8b59cf15a26768b75ae23860e59eef2761369efab19fa0fc5d7413b3add38795b8598dcdc48843b41914e061475358085d4734d3c8979b15863f1

  • memory/1204-0-0x0000000000DE0000-0x0000000000E11000-memory.dmp

    Filesize

    196KB

  • memory/1204-8-0x0000000000940000-0x0000000000971000-memory.dmp

    Filesize

    196KB

  • memory/1204-19-0x0000000000DE0000-0x0000000000E11000-memory.dmp

    Filesize

    196KB

  • memory/2312-16-0x0000000001030000-0x0000000001061000-memory.dmp

    Filesize

    196KB

  • memory/2312-22-0x0000000001030000-0x0000000001061000-memory.dmp

    Filesize

    196KB

  • memory/2312-24-0x0000000001030000-0x0000000001061000-memory.dmp

    Filesize

    196KB

  • memory/2312-31-0x0000000001030000-0x0000000001061000-memory.dmp

    Filesize

    196KB