Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 23:55

General

  • Target

    716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe

  • Size

    508KB

  • MD5

    9c5fb0c62ec811e3ee09c3c038c3f4a2

  • SHA1

    965460b96e0039bab84553fc48a86dcc9530a827

  • SHA256

    716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c

  • SHA512

    f367dc4f03ea54a0d5ff87ddade90a6c8b0e6e07c73d7c775c67221869a40a823e3edb3d66ecfdb7f4f4ceec3c96a310304ef07b03c53b72a4f1fd05822aa55d

  • SSDEEP

    12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKoo:3MUv2LAv9AQ1p4dKJ

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
    "C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\tuhui.exe
      "C:\Users\Admin\AppData\Local\Temp\tuhui.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\korai.exe
        "C:\Users\Admin\AppData\Local\Temp\korai.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2888
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    5c1dd70bdbd4dfcfceea0531acb2cf8b

    SHA1

    5e45d5a1c99513e59435b399c8505f696166b313

    SHA256

    b742d7d674f2590555cb69c78af2232cc5696d8e3a5abee68c68e26455008eab

    SHA512

    8a9c00c7745a6c2c2e69b76edf0aa7e0b0d261b06e3a689a7b33a04425d2b925eb07372acb6be1ebcf9399cd24e22ae22312e60c60337023f8740b9365cc9978

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    2f7e8b0ea6c7e5bf47e5ea763b2b5369

    SHA1

    6ec359e00d9da7a2bd3f8b501852697d87066727

    SHA256

    e12cba77cad75a6d1d6554e1f270fd8a121cc48880d63b2ed95278b1316889d8

    SHA512

    cf03fe547e656f5ada9c7bf528bd9745ec9d7f29e225286e914b1730ddfb2965f7ea0665f2432ecec35986095dfbc279d6d0959ebe7557ef45c30c309d0e0b9b

  • C:\Users\Admin\AppData\Local\Temp\tuhui.exe

    Filesize

    508KB

    MD5

    8bc9469925bed1944aae028ba8a3db34

    SHA1

    660f6fa91abd9aafb42e967377f7760de25a453d

    SHA256

    8850073dd0f74be6966e7a38a90f83656beab051d3fefbed7173a3076717dfe5

    SHA512

    e0277322cf3698ddc4ac987911533c49aaf06df067570c3d0a7a5b7cc0f6d86d4b0181fea074523eba93de9204073cb6a4155ac5f34fc08e8accfd6646d3f8a6

  • \Users\Admin\AppData\Local\Temp\korai.exe

    Filesize

    172KB

    MD5

    e5c7a003f91bf5fd81de0014108cefe6

    SHA1

    e67cafc4ff6b42aeb8c68629aed353bce3a7cc4b

    SHA256

    03dad23d1c6a694282157d65cdd53a3c2a79dd637bf62368c39798985a73be9a

    SHA512

    533c14acc6e4552a72c4e024d05663f9eb78aac9cad73b7e5fcc54bcd1c00db481745290ef1b036428a361913b5877b2ad367b090359675b51aeeef5824ee661

  • memory/1992-0-0x0000000000E00000-0x0000000000E81000-memory.dmp

    Filesize

    516KB

  • memory/1992-18-0x0000000000E00000-0x0000000000E81000-memory.dmp

    Filesize

    516KB

  • memory/1992-8-0x0000000002560000-0x00000000025E1000-memory.dmp

    Filesize

    516KB

  • memory/2744-34-0x00000000003F0000-0x0000000000471000-memory.dmp

    Filesize

    516KB

  • memory/2744-21-0x00000000003F0000-0x0000000000471000-memory.dmp

    Filesize

    516KB

  • memory/2744-26-0x0000000003F30000-0x0000000003FC9000-memory.dmp

    Filesize

    612KB

  • memory/2744-11-0x00000000003F0000-0x0000000000471000-memory.dmp

    Filesize

    516KB

  • memory/2888-33-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2888-32-0x0000000000270000-0x0000000000309000-memory.dmp

    Filesize

    612KB

  • memory/2888-29-0x0000000000270000-0x0000000000309000-memory.dmp

    Filesize

    612KB

  • memory/2888-36-0x0000000000270000-0x0000000000309000-memory.dmp

    Filesize

    612KB

  • memory/2888-37-0x0000000000270000-0x0000000000309000-memory.dmp

    Filesize

    612KB

  • memory/2888-38-0x0000000000270000-0x0000000000309000-memory.dmp

    Filesize

    612KB

  • memory/2888-39-0x0000000000270000-0x0000000000309000-memory.dmp

    Filesize

    612KB

  • memory/2888-40-0x0000000000270000-0x0000000000309000-memory.dmp

    Filesize

    612KB