Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2024, 03:58

General

  • Target

    3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe

  • Size

    441KB

  • MD5

    f86dcb4311922e5e86616c5304ba2d19

  • SHA1

    90a2443c818be2c5d347b74e41eda53011386b45

  • SHA256

    3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38

  • SHA512

    874524ea9560d72754092debb60c1962d717f4ca2a986713a40f32e6d99448e19200de54b32bad4034e4522c9ed4ed7cb52f13ae33eb4d186be1fcfa721165c3

  • SSDEEP

    6144:oo3wBi+1Py3V0a2WkRNgi3caOHO5NjEwwiYWB5mV4Pzw9ygibGGM/:rKf1PyKa2H3hOHOHz9JQ6zBO

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe
    "C:\Users\Admin\AppData\Local\Temp\3446560be933db07885e01658cad196df816cde7c8537097de5bb36fdf583d38.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\geryc.exe
      "C:\Users\Admin\AppData\Local\Temp\geryc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\purez.exe
        "C:\Users\Admin\AppData\Local\Temp\purez.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2040
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    34075250eff8037ef38c111e5b2f6156

    SHA1

    55e3613916263ab6a8b1eef12234e7b27ec2ba0a

    SHA256

    93f5f9f79fb2b0c7197b0e666c06645bd720fbd6d13784abd07c0d95b9a4ee70

    SHA512

    51ac7d7dffef789a0250e4497aeba4a379611d92bda8e285f48571593d35bbb32d836452f80e0f07002eb6345292322831905dee21fbfe75d97efed6fa9f4bc4

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    d729ce54978504303941234be868dcf2

    SHA1

    5962b73ba1091c7176afd51bbcab7099215af2e4

    SHA256

    318b589564d279a556764dd39343a29c7117e8a988e3b7591245eac35a3511f4

    SHA512

    e79481db52382764dc10feaafa87e35e9277a0032a86740db76dc19cb6da01a74dbbef15ab864c20ee3f4cdd0fefe6c6e02ec77586019ce319589c272eb07c7e

  • C:\Users\Admin\AppData\Local\Temp\purez.exe

    Filesize

    230KB

    MD5

    647e105d48a067e076c9159c97017e9f

    SHA1

    9bca458fe5e98faed418b49c7d13ee1758349d8c

    SHA256

    b8bdec7f819a528cf8fcba4d993d0807085762369eadf78f7b3da1c7d35cbb3b

    SHA512

    99d84eaa627ce5719b403cfab8b76714f89f65c0f7a2bc08d91d60f65bc33fcfcd94554cd9191d6b3839cf8a3e084087acd0bdb6a33477a1d973e68f98bdcb19

  • \Users\Admin\AppData\Local\Temp\geryc.exe

    Filesize

    442KB

    MD5

    3390d1a8ce6d453affac94d71a4e8df3

    SHA1

    f9a0ae99bfd5ff5101d506f2080682126c40ab3e

    SHA256

    182f3516acb2fe3b52209353990fe632ae117113f969f36aa975f86cdbbce207

    SHA512

    10c96707c72d0aaab60bd9da29cd55cb0b41b2f64c6341e1cad093d013662bef80772aa5d93e49b0fb1ef3056a4aa3cc49ed38db29e9ba2ae7f703b884dcee4d

  • memory/2040-33-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2040-38-0x00000000013D0000-0x000000000146E000-memory.dmp

    Filesize

    632KB

  • memory/2040-37-0x00000000013D0000-0x000000000146E000-memory.dmp

    Filesize

    632KB

  • memory/2040-36-0x00000000013D0000-0x000000000146E000-memory.dmp

    Filesize

    632KB

  • memory/2040-35-0x00000000013D0000-0x000000000146E000-memory.dmp

    Filesize

    632KB

  • memory/2040-34-0x00000000013D0000-0x000000000146E000-memory.dmp

    Filesize

    632KB

  • memory/2040-31-0x00000000013D0000-0x000000000146E000-memory.dmp

    Filesize

    632KB

  • memory/2040-30-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2748-27-0x00000000036D0000-0x000000000376E000-memory.dmp

    Filesize

    632KB

  • memory/2748-29-0x0000000001140000-0x00000000011AE000-memory.dmp

    Filesize

    440KB

  • memory/2748-21-0x0000000001140000-0x00000000011AE000-memory.dmp

    Filesize

    440KB

  • memory/2748-10-0x0000000001140000-0x00000000011AE000-memory.dmp

    Filesize

    440KB

  • memory/3068-0-0x0000000000210000-0x000000000027E000-memory.dmp

    Filesize

    440KB

  • memory/3068-18-0x0000000000210000-0x000000000027E000-memory.dmp

    Filesize

    440KB

  • memory/3068-8-0x0000000002000000-0x000000000206E000-memory.dmp

    Filesize

    440KB