Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 02:41

General

  • Target

    b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5.exe

  • Size

    55KB

  • MD5

    2560434d7a5b2647f07593ad6d8a6d10

  • SHA1

    13dda438bf017484aac809ee7887039bf8d2fffa

  • SHA256

    b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5

  • SHA512

    bed17b60f905fa66383eef0f08de030707d70e1b4e0884f36ce0ff9f0e6e61c1819817517009167c1e8cd65c045185b77b0f4028b1bfb824f7ab954099f379f8

  • SSDEEP

    1536:qw788avzI+on+TqOK0cHMqtzMLvWsrupwnTf1GqT7O:qwda7KVr0cHneunw1O

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5.exe
    "C:\Users\Admin\AppData\Local\Temp\b8cddc5134178bcf00f7e32c8d8229002fcf3bc6a5c689f42c76ab24577f14c5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2424
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    55KB

    MD5

    134ae3a2ce6fe87b0395f471ed6d8667

    SHA1

    97bd926226fe3e576d50e0c44f400f13bdfd83a7

    SHA256

    fee0f3ec02d335017cc7791ebf003a05850da9a7d7e29e1bcfd147be02183b63

    SHA512

    5bb2843b777241c391243dc0b66e48fa0f7cd4acf53475fb84e7b56998b39f2076c691523d7ed340e276c6600ea7e8aa5ba54f7db1c397f2c4b738173a445535

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    0750e4580a3e9076e82bdc6ad33ba927

    SHA1

    b1e526b3833feda0e3b0738c6865fdac6360bf07

    SHA256

    74428e568204ea0d1c31570864cb96b1c2b672880f7575220957bf5fc2b24d89

    SHA512

    303b2cb8e644b336d7bf0892eadc84b414afdc41216719721aa0cf27fc18ecea1a2e943f07813c41d55c4166e489f89ec61a4fcead679ed3de8b323ecb42a8d9

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    d0b4f2db811e1169aa7c386c9dc5fa2e

    SHA1

    9e5da6d8cfeba6483091ba7d3cdd8aab1c2f6350

    SHA256

    97a4ab24c203cd1215e1bb90f66ab350d7d22d86d04eb5b3c3ce7bc2feef036e

    SHA512

    01c56906ae3458ef0d16c4a322fa12a1197db0c44c1b3c185dfd4cece0d1c7660b858533360d9aa73ec43a55500fd18d38bd5360bf031a8a2be5ddccfd4d727c

  • memory/216-0-0x00000000009B0000-0x00000000009E1000-memory.dmp

    Filesize

    196KB

  • memory/216-17-0x00000000009B0000-0x00000000009E1000-memory.dmp

    Filesize

    196KB

  • memory/2424-15-0x0000000000BC0000-0x0000000000BF1000-memory.dmp

    Filesize

    196KB

  • memory/2424-20-0x0000000000BC0000-0x0000000000BF1000-memory.dmp

    Filesize

    196KB

  • memory/2424-22-0x0000000000BC0000-0x0000000000BF1000-memory.dmp

    Filesize

    196KB

  • memory/2424-29-0x0000000000BC0000-0x0000000000BF1000-memory.dmp

    Filesize

    196KB