Analysis

  • max time kernel
    89s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 01:19

General

  • Target

    1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6.exe

  • Size

    48KB

  • MD5

    d6bf5d60b44618978503a040a5532224

  • SHA1

    d83131212352901df3140ea7c77e808c7bae9e8d

  • SHA256

    1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6

  • SHA512

    2be6ae1afc899dae34cddae9b53fae62993de67ff78dfb7d42c0a48fde3a20e6105ded37e6bcbbf8ae895311a1bbae265b08fef483ae0cb0d8a59b19c40787f9

  • SSDEEP

    1536:Op4/PC7Ruz3hRXRASULZ6JKYdbzcm6lMPR9nE:Qt7R8fU6nWs3E

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6.exe
    "C:\Users\Admin\AppData\Local\Temp\1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\okoser.exe
      "C:\Users\Admin\AppData\Local\Temp\okoser.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2500
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    0b43271388568b7282d66a2022f2bb0e

    SHA1

    695af294c1646f82e9c8a319d1650c272d461e2a

    SHA256

    773878c526d8643ae94343d9a082c0cc75596a3b1bdce71691010908d42cacc5

    SHA512

    1708dbd74eb867a0a1516ddc9e9edc06b2ec902695611ad0670ef1a706d9661344ed71c44cebed87146f85683d8742d42d9b1ede934ebad828191a045e131321

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    e0b5593673bbf0c0bc8591381c9d8546

    SHA1

    856cc2d283b74b3b83521d37556b685d795cdc3f

    SHA256

    aaf5d0f341f34766eb6d7b32a4519e2addd56ea4845378790e91800fbf0884c3

    SHA512

    2db0f8f262b1f90893d64d4fff8bb17292f9222af9516a18ada3566202637136e78ca5510a3e843ad81bdc495a4dcf5587a2f084d0e35edd36a441c49026f085

  • \Users\Admin\AppData\Local\Temp\okoser.exe

    Filesize

    49KB

    MD5

    d414cf8c35a4a084d74e15d34841bcb9

    SHA1

    f9ff2f79ab8d05f184e8affb016740066ca79562

    SHA256

    65699cadbf1bfc325b5cda01eb289da98be01260dc9e5dd32bafca0d5c6ed0b3

    SHA512

    6c0aa780bd00d920b14fead146ac8cabc4f737dc1376daff5bb65fcbd627db31e72c9230093cf3916d4e88b7c6944cbbbbd2ad24ab28529b720adbc491b0f6fc

  • memory/1852-0-0x0000000000890000-0x00000000008C3000-memory.dmp

    Filesize

    204KB

  • memory/1852-7-0x0000000000770000-0x00000000007A3000-memory.dmp

    Filesize

    204KB

  • memory/1852-19-0x0000000000890000-0x00000000008C3000-memory.dmp

    Filesize

    204KB

  • memory/2500-16-0x0000000001090000-0x00000000010C3000-memory.dmp

    Filesize

    204KB

  • memory/2500-22-0x0000000001090000-0x00000000010C3000-memory.dmp

    Filesize

    204KB

  • memory/2500-24-0x0000000001090000-0x00000000010C3000-memory.dmp

    Filesize

    204KB

  • memory/2500-31-0x0000000001090000-0x00000000010C3000-memory.dmp

    Filesize

    204KB