Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2024, 17:57

General

  • Target

    a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe

  • Size

    557KB

  • MD5

    7fe3c05a108db999797fe06051691586

  • SHA1

    2b44f9d07a02e336dc6c9742b064a21340cedc88

  • SHA256

    a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280

  • SHA512

    e95fb30851baba7b2076ddc18fcca1d63dbbb9c602082bab3c010073cdfeebe10a71c88c55601cbb84f175ac3a2f8d9ddbe7141c1b6ba208b8606ac33a24c471

  • SSDEEP

    12288:zccNvdRExZGe+Q1nSoS++43x+l7QLiaEyT:znPfQp9L3olqFT

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe
    "C:\Users\Admin\AppData\Local\Temp\a5ca924b9f7adb89ca3ee2a87b65ef17f94ee3c47071157f3c421c87556a8280.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Local\Temp\liobo.exe
      "C:\Users\Admin\AppData\Local\Temp\liobo.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\koqok.exe
        "C:\Users\Admin\AppData\Local\Temp\koqok.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1784
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    b3ce5c1b79472fa7760a9cc0061075e5

    SHA1

    821a121ce2e23654efa7771d65fbe33bbf096eea

    SHA256

    cd5eb434e04e6db59d9d7be262689599ae0217ee48a45483f347106eb6a9f005

    SHA512

    184dc97c249581b992a5d81d819e8aeacd93b30f355afb2b32bbd2e4cbece549ecfab409261ecd2575659f2fa85340e7abf940e275a7c1b16bb2b8343345d009

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    50a06188f0a2d57808bfd39e4e262e5a

    SHA1

    a747084b5ad1d30ce80480b496b1459956fbbe01

    SHA256

    e09d87b32fa0f16a017a3cf41aa16173050631d158db3e0125298b8554fc262e

    SHA512

    a8ceb6c6dfaba1e44dcf33c2bea2656258d605e0a8c80981dd8b5f6434b7ad6ffeeea2d8c550583a1eb321cdf03c803f1221510cbba9d69b11e0de0d6b48a2a6

  • C:\Users\Admin\AppData\Local\Temp\koqok.exe

    Filesize

    194KB

    MD5

    71607e9d7349d353d9ad9938de69c5c0

    SHA1

    a0665696579c5c97a89319559bb42f8bae17587f

    SHA256

    9b40d7c827468935b5e783ae7327ca3ed8d1179f42e31ccf0b29022c36d3b260

    SHA512

    bd73b852a414970ae4711d895b0200b1b65195c6a16639a877cfaafa86ed3cf50961cc4a43fe3f62cebbbe19ea818fba056c9119c5d1ea53be692dc3da9b7553

  • C:\Users\Admin\AppData\Local\Temp\liobo.exe

    Filesize

    558KB

    MD5

    195c538afe7cb6d06418747dd1350d0b

    SHA1

    6dd548df5cf3260b2db259b44fb6ab26c148ad94

    SHA256

    1fcd2797719ad20fe2a0f092c2b6a73ab0d4cd8a20fedc46ebb1ba687fd394ea

    SHA512

    36d7194e6d9b0fa9c5cbe14fb3bd89ea592b0cf664039b645395a0829d2056cec98f4321056ff1252e71dbd71fccc212a180bcebd10211898e69177bb57cafde

  • memory/1600-11-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/1600-28-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/1600-17-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/1784-27-0x00000000001D0000-0x00000000001D2000-memory.dmp

    Filesize

    8KB

  • memory/1784-26-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1784-31-0x00000000001D0000-0x00000000001D2000-memory.dmp

    Filesize

    8KB

  • memory/1784-30-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1784-32-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1784-33-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1784-34-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1784-35-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/4012-0-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/4012-14-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB