Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 04:47

General

  • Target

    c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe

  • Size

    333KB

  • MD5

    1451a4312a14a1ac2cfa72abc1c76b74

  • SHA1

    e0a59172e30587cf9bbef9f917f8bb3735dbb901

  • SHA256

    c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b

  • SHA512

    2f1c8bb8b61241860dd820f43aa79f59ca700c08014d0be9dcc7a17b121e849fade8460a7d6b0cf1f8ee98b0f0efcd18226746995c8bd18d549bfa9b5c1387d3

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYX:vHW138/iXWlK885rKlGSekcj66cii

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe
    "C:\Users\Admin\AppData\Local\Temp\c3b764212020bc5880a8c35fe63d09f56e974af94ddfd8dd5e4cb373892b182b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\wocep.exe
      "C:\Users\Admin\AppData\Local\Temp\wocep.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\fyluy.exe
        "C:\Users\Admin\AppData\Local\Temp\fyluy.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4776
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    7cd9f9bb0ccbb16c739aed2228374e01

    SHA1

    0cd8d6938dc888d475481ed6281a2219081cdc0b

    SHA256

    51764318932983eb7cafc2c79850962dd0cd66f6cdd9ed8ac37e3ce424f9cd3e

    SHA512

    2211757a4f94cb07943c94b644659cfedc7997f98ea12e45aa88f63be40b202cef43b14a9072c61cced53757dfce075e11d6d28fee57f5171c5ff8d48d1ff1ec

  • C:\Users\Admin\AppData\Local\Temp\fyluy.exe

    Filesize

    172KB

    MD5

    0d27f3d7e23f041afb0dad4a09a68544

    SHA1

    c103267572ffd81fad217ad38111de26f8897fe9

    SHA256

    510b09451ca3c9ca0d5216217c276f9be9866036abed6eab254acf471c2d3655

    SHA512

    9720ee43b2fd1db79596f955c998d66667cca046d7791f7faff6f5fd43b4cd7c8c70f3ac75fc5df8ca8b413f246377158307aa9fa7df8d3f406f9a04cabb4ed1

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    ed207ee81e8c3eb726504f8411211ed4

    SHA1

    1a30bcaee546cbc9313020a4593a57ca941bde64

    SHA256

    132fdcadc41fa74e734efe23c1749c900749f430d69914aa8809f431ead31daf

    SHA512

    0d9f2186a6713775146df07f61e9cc0487162c90f48c12b6f6993114befebcca299fd4d7d509547776ebcd46af95ca0e9b48cc4cb9ad32f0496082b80a4715c9

  • C:\Users\Admin\AppData\Local\Temp\wocep.exe

    Filesize

    333KB

    MD5

    952c7ec3e4100a1c57d953139838ed98

    SHA1

    1f62e03bb6b203420a30595d13bbd93206654480

    SHA256

    b447f00d5b1a51613f8f8cac76a34c50b709ccc7ac5ba9ebfcbee1dce0418d3e

    SHA512

    9a8427807bb74a174be9c74669c59451fbea2439b6204ff57ae36dfe6cfdcceb3067fd20bebbe3c21cb8c67b6cfd29ec7ab8aea3b6caa5c05454188d0e8f9575

  • memory/3444-17-0x0000000000960000-0x00000000009E1000-memory.dmp

    Filesize

    516KB

  • memory/3444-0-0x0000000000960000-0x00000000009E1000-memory.dmp

    Filesize

    516KB

  • memory/3444-1-0x00000000008C0000-0x00000000008C1000-memory.dmp

    Filesize

    4KB

  • memory/4456-11-0x0000000000560000-0x00000000005E1000-memory.dmp

    Filesize

    516KB

  • memory/4456-13-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/4456-20-0x0000000000560000-0x00000000005E1000-memory.dmp

    Filesize

    516KB

  • memory/4456-21-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/4456-44-0x0000000000560000-0x00000000005E1000-memory.dmp

    Filesize

    516KB

  • memory/4776-40-0x0000000000F80000-0x0000000001019000-memory.dmp

    Filesize

    612KB

  • memory/4776-38-0x0000000000F80000-0x0000000001019000-memory.dmp

    Filesize

    612KB

  • memory/4776-39-0x0000000000750000-0x0000000000752000-memory.dmp

    Filesize

    8KB

  • memory/4776-46-0x0000000000750000-0x0000000000752000-memory.dmp

    Filesize

    8KB

  • memory/4776-47-0x0000000000F80000-0x0000000001019000-memory.dmp

    Filesize

    612KB

  • memory/4776-48-0x0000000000F80000-0x0000000001019000-memory.dmp

    Filesize

    612KB

  • memory/4776-49-0x0000000000F80000-0x0000000001019000-memory.dmp

    Filesize

    612KB

  • memory/4776-50-0x0000000000F80000-0x0000000001019000-memory.dmp

    Filesize

    612KB

  • memory/4776-51-0x0000000000F80000-0x0000000001019000-memory.dmp

    Filesize

    612KB