Analysis

  • max time kernel
    119s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2024 02:59

General

  • Target

    7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe

  • Size

    427KB

  • MD5

    9f5a76606f02cc96ed2530eb6ba13c7f

  • SHA1

    40e448fe4bba1f92069e518706a0433417a07c37

  • SHA256

    7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5

  • SHA512

    c39c57ed0dea297553a659187fd72c89a70dcd68b20830c89a22851919081e3a5c72ca7aeeeb1844116dd70783a179e7224188fcd96ecd5a5cec440bd24e89cb

  • SSDEEP

    6144:EKbwhNxUjDVMytD2NkWuRk/oBmodd+sAaTmQo2fkKv:vANxU3VH1t19MsAlpXG

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe
    "C:\Users\Admin\AppData\Local\Temp\7c6cbbd4cc596f17474662240ca740a05593f42401575b27fda1b2c19a12aff5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\luibb.exe
      "C:\Users\Admin\AppData\Local\Temp\luibb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\cugio.exe
        "C:\Users\Admin\AppData\Local\Temp\cugio.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:236
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    8f00f73dc2327194b161ef418fc93c13

    SHA1

    17b54cb67ce70cf225e7807ee1dc5eaf5c1412bc

    SHA256

    0069ed5fe201679710c34e0ba7dc99358b5fefe1f6ed1fe3f446ea044e9f1e7b

    SHA512

    b67f29190dd78ab220832fd9a7f4a1a7ad801593d29da13bf9ad5c5dea1a645aacf25bfb25e3dbd1b9ae1e7c0e5e9ed16950897ce755e2fd6e397a2b1cb03b27

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    26a66a62c45b86c08364e062264b1ef3

    SHA1

    0fd134a4ebaebcac771ae4eccb21cc5519ec201f

    SHA256

    fe38b941ed7b10cc473c78f04b03de627e0cbdb42ca713d8c7daddd2c389193e

    SHA512

    e31bd9585a4fb89381a1d5ac569d98bb63b84e4646f281c5b68b959f64bcf21221dcaf8233b531d9c2d4dfb56bf369c6c077c8ff50de7f0227d111bfceb2fd23

  • \Users\Admin\AppData\Local\Temp\cugio.exe

    Filesize

    216KB

    MD5

    03f146883694d51ada27ea3239781ef1

    SHA1

    a06d13904b44215cd2eda399a39cb5225c9f1310

    SHA256

    abe0a3b7140df7dcb604be8b0b7fcb28688b66bfd10ec887511991327723706f

    SHA512

    d50aff6ccd8cf6694769c93aef089b47ac89d441bd2c49ccbbd6fdc6c412701dc51cb69c5d0b60b6b489c614aa0c5d4ae48f9ac4256a44f6cebeaa0f4922e205

  • \Users\Admin\AppData\Local\Temp\luibb.exe

    Filesize

    427KB

    MD5

    cf28276e3825b05fb001595d07b130ca

    SHA1

    530afa7e8ff8e89c9524613084e0515014da3ea6

    SHA256

    228d191dc441f7ab594290976b6873f9f979d126a8f2430c265f0186107ba2ec

    SHA512

    69871feeed588eedf06fa093633accbaff902cc9de77fa77594f6d2ca6f4a25a2eee5f1242aba0d803b48816848b4ae341cae85268aea871965caefec2ea7984

  • memory/236-34-0x0000000000BD0000-0x0000000000C72000-memory.dmp

    Filesize

    648KB

  • memory/236-32-0x0000000000BD0000-0x0000000000C72000-memory.dmp

    Filesize

    648KB

  • memory/236-35-0x0000000000BD0000-0x0000000000C72000-memory.dmp

    Filesize

    648KB

  • memory/236-33-0x0000000000BD0000-0x0000000000C72000-memory.dmp

    Filesize

    648KB

  • memory/236-37-0x0000000000BD0000-0x0000000000C72000-memory.dmp

    Filesize

    648KB

  • memory/236-38-0x0000000000BD0000-0x0000000000C72000-memory.dmp

    Filesize

    648KB

  • memory/2444-21-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2444-11-0x00000000024D0000-0x0000000002538000-memory.dmp

    Filesize

    416KB

  • memory/2444-12-0x00000000024D0000-0x0000000002538000-memory.dmp

    Filesize

    416KB

  • memory/2444-0-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2496-24-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2496-30-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB