Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 23:01

General

  • Target

    41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe

  • Size

    55KB

  • MD5

    a25ddf0fd1ed5c42d60a8b1fd7df0cd1

  • SHA1

    c98951417f3117899f0c63a5097f9fe0a8f4d43d

  • SHA256

    41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf

  • SHA512

    ece28ec1ffff9cfe6d49d8846232606ab2713dd2fc3416bde8ae884297b025165d46899b67a129f05be122a63afd4b120d6f5b3107e11553c3e3ce881e1899de

  • SSDEEP

    1536:qw788avzI+on+TqOK0cHMqtzMLvWsrupwnTf1GqT7E:qwda7KVr0cHneunw1E

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe
    "C:\Users\Admin\AppData\Local\Temp\41cb2ed3a414003a5c88ec6e28131ea28a0395e8ccbe541113e2a3343fddc4bf.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1688
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    56KB

    MD5

    0b3c21221bc94d7767db7f745aad911a

    SHA1

    02adca7150ee80b5fa73cac46b56fe7166639d96

    SHA256

    0c971d1c8e2bc53c99ac352cd31f68e29c6afa1c42b2c344efcf4dde5e198a58

    SHA512

    0397c55406b6dd772262956a3c83b9d2f7c4f07ab648a2801260b12c1d90141f00f5e63339192ce8310c17196a8056aaf0094a703157614c6c2ea85bbf04fd2a

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    0750e4580a3e9076e82bdc6ad33ba927

    SHA1

    b1e526b3833feda0e3b0738c6865fdac6360bf07

    SHA256

    74428e568204ea0d1c31570864cb96b1c2b672880f7575220957bf5fc2b24d89

    SHA512

    303b2cb8e644b336d7bf0892eadc84b414afdc41216719721aa0cf27fc18ecea1a2e943f07813c41d55c4166e489f89ec61a4fcead679ed3de8b323ecb42a8d9

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    06d7bf5c3af0789f97d114be8ae5d33d

    SHA1

    e9e2969b2fe545dfe2ca056a4a5b1f744f264bf8

    SHA256

    82274b407242cb4c72fc273a23212f5a71bbc2724cc381beb8e3299831a565b3

    SHA512

    c8cd2b5f4be0e5365fd1823fc31d6ff012a75f9f0b7e394e0054ff4a0d5316fcfba7be5251b828dbf35020a86a8fcabd0e1e129897cbe890f86e03032542c1cd

  • memory/1688-10-0x00000000000B0000-0x00000000000E1000-memory.dmp

    Filesize

    196KB

  • memory/1688-22-0x00000000000B0000-0x00000000000E1000-memory.dmp

    Filesize

    196KB

  • memory/1688-24-0x00000000000B0000-0x00000000000E1000-memory.dmp

    Filesize

    196KB

  • memory/1688-31-0x00000000000B0000-0x00000000000E1000-memory.dmp

    Filesize

    196KB

  • memory/2404-0-0x00000000002C0000-0x00000000002F1000-memory.dmp

    Filesize

    196KB

  • memory/2404-9-0x0000000000370000-0x00000000003A1000-memory.dmp

    Filesize

    196KB

  • memory/2404-19-0x00000000002C0000-0x00000000002F1000-memory.dmp

    Filesize

    196KB