Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 00:12

General

  • Target

    716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe

  • Size

    508KB

  • MD5

    9c5fb0c62ec811e3ee09c3c038c3f4a2

  • SHA1

    965460b96e0039bab84553fc48a86dcc9530a827

  • SHA256

    716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c

  • SHA512

    f367dc4f03ea54a0d5ff87ddade90a6c8b0e6e07c73d7c775c67221869a40a823e3edb3d66ecfdb7f4f4ceec3c96a310304ef07b03c53b72a4f1fd05822aa55d

  • SSDEEP

    12288:3o7CGWcQSyYI2VrFKH5RBv9AQ1pEDdKoo:3MUv2LAv9AQ1p4dKJ

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe
    "C:\Users\Admin\AppData\Local\Temp\716a1ae7074f71915ea6c547cc890fa82838d24b11fc7e1778a78298d00b272c.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\qaqih.exe
      "C:\Users\Admin\AppData\Local\Temp\qaqih.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Users\Admin\AppData\Local\Temp\xocic.exe
        "C:\Users\Admin\AppData\Local\Temp\xocic.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:380
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    5c1dd70bdbd4dfcfceea0531acb2cf8b

    SHA1

    5e45d5a1c99513e59435b399c8505f696166b313

    SHA256

    b742d7d674f2590555cb69c78af2232cc5696d8e3a5abee68c68e26455008eab

    SHA512

    8a9c00c7745a6c2c2e69b76edf0aa7e0b0d261b06e3a689a7b33a04425d2b925eb07372acb6be1ebcf9399cd24e22ae22312e60c60337023f8740b9365cc9978

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    f2e38c5e7679e6775feaffd4b36bc432

    SHA1

    fe002d047dda583587a8e70a97f0889935da329f

    SHA256

    daf80ad4389376393306a6f60ccf0717205ee782237a0cdf4a522bfb37a48c0f

    SHA512

    61220b0ed20c6fa587e035014d1c04bf945cb5d6eade1f6eb596911233b8ab0855cfa9b914b5506db63e98f00d435bab65736af4be18d5e48ff8901b925a49b5

  • C:\Users\Admin\AppData\Local\Temp\qaqih.exe

    Filesize

    508KB

    MD5

    215c7e7394faf2f52f8f8d2b7a6612e7

    SHA1

    63f9b95993454513c9a765660974618082be184d

    SHA256

    f3771344134bb7e484c52e05ac616aa3a2aacccfd3a4613cdf2c40cef614803d

    SHA512

    442a98d2b5b29a2135a1325320691fd0862856d19e2f48cca683fba8efcd483b6dcbe37c3a1fdf21451ffcb0e887d29640e56adc64af27eba6f4eec951d9ea04

  • C:\Users\Admin\AppData\Local\Temp\xocic.exe

    Filesize

    172KB

    MD5

    0f8813d89b33d670d8063b394ea9d18d

    SHA1

    b130ec956efb7b3a88f2b5d6a72d7e1bee8de613

    SHA256

    bd1549b5d9669ad61f63db502bceabb594338d80a2e6cfa3fe719bfaffd4dbfe

    SHA512

    e095e6677c70c3d1c3b5283dd4a5657180b3cb00f83e5f491b5701c31d15109656180862594f7173ce015a7f25f3060c47f1f3071838f68de0aeeda31b6f36b2

  • memory/380-28-0x0000000000CD0000-0x0000000000CD2000-memory.dmp

    Filesize

    8KB

  • memory/380-35-0x0000000000DE0000-0x0000000000E79000-memory.dmp

    Filesize

    612KB

  • memory/380-38-0x0000000000DE0000-0x0000000000E79000-memory.dmp

    Filesize

    612KB

  • memory/380-37-0x0000000000DE0000-0x0000000000E79000-memory.dmp

    Filesize

    612KB

  • memory/380-36-0x0000000000DE0000-0x0000000000E79000-memory.dmp

    Filesize

    612KB

  • memory/380-34-0x0000000000CD0000-0x0000000000CD2000-memory.dmp

    Filesize

    8KB

  • memory/380-25-0x0000000000DE0000-0x0000000000E79000-memory.dmp

    Filesize

    612KB

  • memory/380-29-0x0000000000DE0000-0x0000000000E79000-memory.dmp

    Filesize

    612KB

  • memory/380-33-0x0000000000DE0000-0x0000000000E79000-memory.dmp

    Filesize

    612KB

  • memory/2880-14-0x0000000000500000-0x0000000000581000-memory.dmp

    Filesize

    516KB

  • memory/2880-0-0x0000000000500000-0x0000000000581000-memory.dmp

    Filesize

    516KB

  • memory/4120-27-0x00000000004E0000-0x0000000000561000-memory.dmp

    Filesize

    516KB

  • memory/4120-9-0x00000000004E0000-0x0000000000561000-memory.dmp

    Filesize

    516KB

  • memory/4120-17-0x00000000004E0000-0x0000000000561000-memory.dmp

    Filesize

    516KB