Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 01:31

General

  • Target

    1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6.exe

  • Size

    48KB

  • MD5

    d6bf5d60b44618978503a040a5532224

  • SHA1

    d83131212352901df3140ea7c77e808c7bae9e8d

  • SHA256

    1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6

  • SHA512

    2be6ae1afc899dae34cddae9b53fae62993de67ff78dfb7d42c0a48fde3a20e6105ded37e6bcbbf8ae895311a1bbae265b08fef483ae0cb0d8a59b19c40787f9

  • SSDEEP

    1536:Op4/PC7Ruz3hRXRASULZ6JKYdbzcm6lMPR9nE:Qt7R8fU6nWs3E

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6.exe
    "C:\Users\Admin\AppData\Local\Temp\1426fa71c4361e62b95dd48e571bd9bc9de984823c11ad0023a830eb252c46c6.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\okoser.exe
      "C:\Users\Admin\AppData\Local\Temp\okoser.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1888
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    0b43271388568b7282d66a2022f2bb0e

    SHA1

    695af294c1646f82e9c8a319d1650c272d461e2a

    SHA256

    773878c526d8643ae94343d9a082c0cc75596a3b1bdce71691010908d42cacc5

    SHA512

    1708dbd74eb867a0a1516ddc9e9edc06b2ec902695611ad0670ef1a706d9661344ed71c44cebed87146f85683d8742d42d9b1ede934ebad828191a045e131321

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    e0b5593673bbf0c0bc8591381c9d8546

    SHA1

    856cc2d283b74b3b83521d37556b685d795cdc3f

    SHA256

    aaf5d0f341f34766eb6d7b32a4519e2addd56ea4845378790e91800fbf0884c3

    SHA512

    2db0f8f262b1f90893d64d4fff8bb17292f9222af9516a18ada3566202637136e78ca5510a3e843ad81bdc495a4dcf5587a2f084d0e35edd36a441c49026f085

  • \Users\Admin\AppData\Local\Temp\okoser.exe

    Filesize

    49KB

    MD5

    c962c5fb707ee6ed12d647433f252624

    SHA1

    105c97dce17f7213d68fc3e63c81af5916bf709f

    SHA256

    21149506527e3a67848dbe23f2f0e4f8aa7b1360fe4ae8fd171e844c82ed670b

    SHA512

    562e3995c18a65c85f5294e71d714437996c861d11beea524279b1e3e1582b732f624774de941e58f306a165f51ec4b1c1de2841a2501b412657a1f4c2d1c00e

  • memory/1888-10-0x0000000001390000-0x00000000013C3000-memory.dmp

    Filesize

    204KB

  • memory/1888-21-0x0000000001390000-0x00000000013C3000-memory.dmp

    Filesize

    204KB

  • memory/1888-23-0x0000000001390000-0x00000000013C3000-memory.dmp

    Filesize

    204KB

  • memory/1888-30-0x0000000001390000-0x00000000013C3000-memory.dmp

    Filesize

    204KB

  • memory/2380-0-0x00000000000E0000-0x0000000000113000-memory.dmp

    Filesize

    204KB

  • memory/2380-8-0x0000000000350000-0x0000000000383000-memory.dmp

    Filesize

    204KB

  • memory/2380-18-0x00000000000E0000-0x0000000000113000-memory.dmp

    Filesize

    204KB