Analysis

  • max time kernel
    90s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2024, 02:41

General

  • Target

    b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5.exe

  • Size

    55KB

  • MD5

    2560434d7a5b2647f07593ad6d8a6d10

  • SHA1

    13dda438bf017484aac809ee7887039bf8d2fffa

  • SHA256

    b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5

  • SHA512

    bed17b60f905fa66383eef0f08de030707d70e1b4e0884f36ce0ff9f0e6e61c1819817517009167c1e8cd65c045185b77b0f4028b1bfb824f7ab954099f379f8

  • SSDEEP

    1536:qw788avzI+on+TqOK0cHMqtzMLvWsrupwnTf1GqT7O:qwda7KVr0cHneunw1O

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5.exe
    "C:\Users\Admin\AppData\Local\Temp\b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2716
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    55KB

    MD5

    3e9d0b83e7f26079080a23f8e480a0e1

    SHA1

    799384a6e3881d63ceac572633f6765c812a398e

    SHA256

    ce2a89e85e4ea2ca528b823f39ec92183bbb455887eec4e1cad30517df484a7e

    SHA512

    c1d0299033c830dc478a2c822f6908b09f505239cca29b56bd74ae9b2ed7b1105f666a6aa54c14b3cf2d1245268200cc4e7d7ca0ff579256c499f6ad99ed17b3

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    0750e4580a3e9076e82bdc6ad33ba927

    SHA1

    b1e526b3833feda0e3b0738c6865fdac6360bf07

    SHA256

    74428e568204ea0d1c31570864cb96b1c2b672880f7575220957bf5fc2b24d89

    SHA512

    303b2cb8e644b336d7bf0892eadc84b414afdc41216719721aa0cf27fc18ecea1a2e943f07813c41d55c4166e489f89ec61a4fcead679ed3de8b323ecb42a8d9

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    d0b4f2db811e1169aa7c386c9dc5fa2e

    SHA1

    9e5da6d8cfeba6483091ba7d3cdd8aab1c2f6350

    SHA256

    97a4ab24c203cd1215e1bb90f66ab350d7d22d86d04eb5b3c3ce7bc2feef036e

    SHA512

    01c56906ae3458ef0d16c4a322fa12a1197db0c44c1b3c185dfd4cece0d1c7660b858533360d9aa73ec43a55500fd18d38bd5360bf031a8a2be5ddccfd4d727c

  • memory/2540-0-0x0000000000F40000-0x0000000000F71000-memory.dmp

    Filesize

    196KB

  • memory/2540-16-0x00000000008A0000-0x00000000008D1000-memory.dmp

    Filesize

    196KB

  • memory/2540-19-0x0000000000F40000-0x0000000000F71000-memory.dmp

    Filesize

    196KB

  • memory/2716-17-0x0000000000C00000-0x0000000000C31000-memory.dmp

    Filesize

    196KB

  • memory/2716-22-0x0000000000C00000-0x0000000000C31000-memory.dmp

    Filesize

    196KB

  • memory/2716-25-0x0000000000C00000-0x0000000000C31000-memory.dmp

    Filesize

    196KB

  • memory/2716-31-0x0000000000C00000-0x0000000000C31000-memory.dmp

    Filesize

    196KB