Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 04:30

General

  • Target

    fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe

  • Size

    326KB

  • MD5

    cb2f0bb88d5b11b5b7efc71f55ee8eaa

  • SHA1

    e94f72af58ebf1806d276fda558f7d7d3748eb71

  • SHA256

    fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270

  • SHA512

    318c91505d0999cf89241d31a3a90394606b32c1fd6d271e3acfb46eb23d4efb6d4cd9db3e14ba915ffe24940b969bff3f20e32c112a89e63ce04e304254ca0c

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYH:vHW138/iXWlK885rKlGSekcj66ci6

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe
    "C:\Users\Admin\AppData\Local\Temp\fbe6326771cb0236b4bc19bf375f8a9526e00e57569b8652dcf71caf40f97270.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\goyqd.exe
      "C:\Users\Admin\AppData\Local\Temp\goyqd.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:452
      • C:\Users\Admin\AppData\Local\Temp\irmia.exe
        "C:\Users\Admin\AppData\Local\Temp\irmia.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4276
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    a0ff66e357e350b422bc8a3e8cf7880c

    SHA1

    7841b2937304e6d684f0066f43b7a24873ba3b26

    SHA256

    161080cc048732eed717b2cdae265a98ef72c55b24808338f10fa5237594c637

    SHA512

    b468a81c00a704d67cd2df7cfcb7be9a1b62cb58c1d1e74031f0935917c46b02bc22ff3d003a7a6d98c2c5c741903578efe6c4db63396c8d61f6a2eb9c0148d0

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    486c4d70fc573d3163fa1f4b9b5ebc39

    SHA1

    e33cbd210768928595b773ba03cb3d954831f54a

    SHA256

    ad1c959c1b17e9ec190d39761f7dcbf7d52468ae3ac567a7413f73d7a82c8aea

    SHA512

    e0a42c792e639177252ac9e67faaa78048f7c446445dd108db9a2d3296112611ef61f417bd60ea5ad5bf5d88ab502f768b72c1d6dbf216db9c642bd605e42981

  • C:\Users\Admin\AppData\Local\Temp\goyqd.exe

    Filesize

    326KB

    MD5

    767c5a7831665676a7a46d9cf4a3b44e

    SHA1

    cf083aa6e954800b7766fd2b0e3af5055f85fe07

    SHA256

    eee047a8aa4eb1c8a35565931dbf1f8209e5a89293d46c1cc595a9efcc42356c

    SHA512

    dcae92830b7704471618cab818ff5a537612fa5c2ab14c0a2f53e5da65d486f4cdc3bdfd879642a386e93669de78180092c425dc6f4418e005961295fe520507

  • C:\Users\Admin\AppData\Local\Temp\irmia.exe

    Filesize

    172KB

    MD5

    ee4b1e0ff004f3e4ba4c96627ea9bd8a

    SHA1

    91ac4113337e93a47ca08b31e94aa3ef2b8a937b

    SHA256

    9c860d0dfc4072af1db28a3595e2d5a27b90131bfa3e510a1e6156d8bc8fa5bd

    SHA512

    3b6323c268956873baad80b43ac84a441359c95c539026afd346ba1a467cfa9a27b1d70e663de853ca339df2aa42035ebf82552a341b6e2f5dbbbf5103082cae

  • memory/452-20-0x0000000000A90000-0x0000000000B11000-memory.dmp

    Filesize

    516KB

  • memory/452-11-0x0000000000A90000-0x0000000000B11000-memory.dmp

    Filesize

    516KB

  • memory/452-13-0x0000000000A90000-0x0000000000B11000-memory.dmp

    Filesize

    516KB

  • memory/452-43-0x0000000000A90000-0x0000000000B11000-memory.dmp

    Filesize

    516KB

  • memory/2292-17-0x0000000000ED0000-0x0000000000F51000-memory.dmp

    Filesize

    516KB

  • memory/2292-0-0x0000000000ED0000-0x0000000000F51000-memory.dmp

    Filesize

    516KB

  • memory/2292-1-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

    Filesize

    4KB

  • memory/4276-37-0x0000000000420000-0x00000000004B9000-memory.dmp

    Filesize

    612KB

  • memory/4276-38-0x0000000000420000-0x00000000004B9000-memory.dmp

    Filesize

    612KB

  • memory/4276-41-0x0000000000FF0000-0x0000000000FF2000-memory.dmp

    Filesize

    8KB

  • memory/4276-45-0x0000000000420000-0x00000000004B9000-memory.dmp

    Filesize

    612KB

  • memory/4276-46-0x0000000000420000-0x00000000004B9000-memory.dmp

    Filesize

    612KB

  • memory/4276-47-0x0000000000420000-0x00000000004B9000-memory.dmp

    Filesize

    612KB

  • memory/4276-48-0x0000000000420000-0x00000000004B9000-memory.dmp

    Filesize

    612KB

  • memory/4276-49-0x0000000000420000-0x00000000004B9000-memory.dmp

    Filesize

    612KB