Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 04:35

General

  • Target

    fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe

  • Size

    326KB

  • MD5

    db3ef99e9fb2072690240efd726fafd5

  • SHA1

    6995f9f7d27d7485c13a781e12466b4dd258d58c

  • SHA256

    fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da

  • SHA512

    1af6e04d2128b3b5d4ac089e4519de22a9e3da3f08c05376678c16bf960a7c8d1aa866bf0ea81e6d5a00e1c806363b0392d3f74173865b4c67cfa84255d64477

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYO:vHW138/iXWlK885rKlGSekcj66ciP

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe
    "C:\Users\Admin\AppData\Local\Temp\fd92d9fd78bf724c048480a7578e8d4bb6ff73465865b4336d6f75d2f7da38da.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\vobui.exe
      "C:\Users\Admin\AppData\Local\Temp\vobui.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\zapob.exe
        "C:\Users\Admin\AppData\Local\Temp\zapob.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1576
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    589afcdf046a6c05693d6221cb1d8e92

    SHA1

    efe4c3b97e770255ccf600881bdc1a2dac5a1b1d

    SHA256

    1f4e709fb783dfb83f58fb98bd7db82f27513a4e0d3c5088d051cc28ab0676cb

    SHA512

    b19c9878ed0ae19f9d351946c7ff48fbf429bb0f869a4a1f35918ad61b3509b398b1c74d203f42f2b990768e4bec1746430ec8514d990d7f6393b011f694c49f

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    b20b036f43e9ce4c38d1cefc5be1a500

    SHA1

    64b40481d540154e475fdcc74909031ab3bed072

    SHA256

    3eb7924f213c72557400f6fd81641893c9af462da9718e1929900c837fd4bf0d

    SHA512

    1576a2ebf737ede2ca7307d2988309e6669b41fe58e657e787c4864c6e1f31ce9803c266182379bd20f8d77d22ff8780ead0f339329400b26c2ffcb361df6de2

  • C:\Users\Admin\AppData\Local\Temp\vobui.exe

    Filesize

    326KB

    MD5

    34268cb6490a3db736cc0826fc85fa18

    SHA1

    382e0357f36aded288e4ed247a479d0aaccdffce

    SHA256

    6948b6aad384ba9d28d224d31916ffa2f4f1f0c046b9695fc33683bf8cdeb4fd

    SHA512

    b3b790f2abd53225314ba9746b5ea5dc9358929f7eb382031d7042a34e720bb7017504644eefb4ca39d2f3f492fc4b68dc2bc8a456f9d38579b49e9690ca5f06

  • C:\Users\Admin\AppData\Local\Temp\zapob.exe

    Filesize

    172KB

    MD5

    429bef1d1c3dcb02462040106cef2ae1

    SHA1

    6ccb5c7169f6c1be89db352c2470b8b9ff9db30b

    SHA256

    1b98e23cfac518c0a8702ac7c84366efc1dc9b82ca83e8a8fc3ba19cde467d12

    SHA512

    2cb122fe6f492e025a03517d4c3a88342b485760d5b63c45eaaf4de7dd5ec9203466d993c5efafa047954dea3bd2abe84aa4447b76d06d29de45f3fceaa7f2c3

  • memory/1208-1-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/1208-17-0x0000000000110000-0x0000000000191000-memory.dmp

    Filesize

    516KB

  • memory/1208-0-0x0000000000110000-0x0000000000191000-memory.dmp

    Filesize

    516KB

  • memory/1380-40-0x0000000000430000-0x00000000004B1000-memory.dmp

    Filesize

    516KB

  • memory/1380-11-0x0000000000430000-0x00000000004B1000-memory.dmp

    Filesize

    516KB

  • memory/1380-14-0x00000000005B0000-0x00000000005B1000-memory.dmp

    Filesize

    4KB

  • memory/1380-20-0x0000000000430000-0x00000000004B1000-memory.dmp

    Filesize

    516KB

  • memory/1576-38-0x00000000013D0000-0x00000000013D2000-memory.dmp

    Filesize

    8KB

  • memory/1576-41-0x00000000008D0000-0x0000000000969000-memory.dmp

    Filesize

    612KB

  • memory/1576-37-0x00000000008D0000-0x0000000000969000-memory.dmp

    Filesize

    612KB

  • memory/1576-46-0x00000000013D0000-0x00000000013D2000-memory.dmp

    Filesize

    8KB

  • memory/1576-45-0x00000000008D0000-0x0000000000969000-memory.dmp

    Filesize

    612KB

  • memory/1576-47-0x00000000008D0000-0x0000000000969000-memory.dmp

    Filesize

    612KB

  • memory/1576-48-0x00000000008D0000-0x0000000000969000-memory.dmp

    Filesize

    612KB

  • memory/1576-49-0x00000000008D0000-0x0000000000969000-memory.dmp

    Filesize

    612KB

  • memory/1576-50-0x00000000008D0000-0x0000000000969000-memory.dmp

    Filesize

    612KB