Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 06:47

General

  • Target

    3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe

  • Size

    348KB

  • MD5

    93db11bb283279a3d520050cf0ef426e

  • SHA1

    f98cb13e6c10407f866ebbc9cb41cac31a293485

  • SHA256

    3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347

  • SHA512

    928217623428c6c85b86872ed5853faa07c0ffbbce829a1f17bf34aec3a47bc85f7557decf95d8d8f591bb3d919720cf1669a1e429750d2b52ba13fbe16ec463

  • SSDEEP

    6144:c/bE5G5KiR0J0dCsnGb/6VOpLc91WlvhDSNZR:A0G5obGGraOpUWlpq

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe
    "C:\Users\Admin\AppData\Local\Temp\3da45666e1ca4ab248a643666b3594f3195bfbe1c47955438fd172f26341e347.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\sezos.exe
      "C:\Users\Admin\AppData\Local\Temp\sezos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Local\Temp\uztuby.exe
        "C:\Users\Admin\AppData\Local\Temp\uztuby.exe" OK
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Users\Admin\AppData\Local\Temp\dorun.exe
          "C:\Users\Admin\AppData\Local\Temp\dorun.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2068
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

    Filesize

    224B

    MD5

    01032fe93edbb670906c3a1e81cb6754

    SHA1

    70e3cb04c5ddcd1b5686e850d162f6b0e0466f3a

    SHA256

    d1851dd24016c00c74131e10200b0c01de08976e36db89d1a0f41e12c77831c6

    SHA512

    25607d3341662dfa4a84231a543e78d2652b4d48cf0320857b5c58d59e480551e197d70c569f12b1d12e02d46fabe6009849d1bc90d325fe7dd60113bd4e3060

  • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

    Filesize

    340B

    MD5

    eab8cdeb2432c313cf894fecaa61891f

    SHA1

    18c946de296176c12a253b09782244d0b32743ee

    SHA256

    04f87133dcb9c056a48337e2a1805bf605e6fb57116d90520d2193594f93b2bd

    SHA512

    6b806a2e34affbfca2a36bb6d3c7a01d18730feb3e2adef2c91cbe19037d015142076e342aa62299756cd65d8a844cf8c120e0e66c7f90df9fb78d3afb9dadf6

  • C:\Users\Admin\AppData\Local\Temp\dorun.exe

    Filesize

    115KB

    MD5

    70b484b8f36943fb214f63032a8d4722

    SHA1

    e92e1b92426744709944e9d263787e18753a2fcc

    SHA256

    80dd790620f8ae211765827d47f290ade3235bef09034cd3a01a91540fc0cc72

    SHA512

    b0b40c9b72ad4aa58c1506a8485c4099a7a91b1df5196c95849eb26112f20a395a5c4461333d6a7dbf6d6eab77d33086c76d2f9ac1e943a23ac2c9f72d1b4797

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    547b0ccc1a9f6b138bf242cea0bdc5c9

    SHA1

    47dc41be6a9df99a1a8a048ff85cf926423559f7

    SHA256

    41b34ae5e35ffe7450edcf281f98b80035aa2a0f20ec2fbbc21b249d926b0ff0

    SHA512

    fa9a9e0880795105ecddb9f7271a2664f9d042acdec0fd0cd2c289396df27437e96d770bb73a76009efda196bb04876b0d454d3b4c9ee13532286002092e3703

  • C:\Users\Admin\AppData\Local\Temp\sezos.exe

    Filesize

    349KB

    MD5

    802865f0a171adea558317643097bb49

    SHA1

    8c667eb15ab45ac98442642741791e8bab7daf99

    SHA256

    1358b66fb9a596b1215b987174ff36fdf6abf0db24388e4a9a3cc7fcea31feec

    SHA512

    6a3e0f136cc70a8b4d717629a3cbd129d25baa820056480b010df50b8bbd401366f75580476be18d47fe6dff964471a83795bf1fdc1cb4e2ec3f1cd1563af60d

  • memory/2068-37-0x00000000005F0000-0x0000000000672000-memory.dmp

    Filesize

    520KB

  • memory/2068-41-0x00000000005F0000-0x0000000000672000-memory.dmp

    Filesize

    520KB

  • memory/2068-42-0x00000000005F0000-0x0000000000672000-memory.dmp

    Filesize

    520KB

  • memory/2068-43-0x00000000005F0000-0x0000000000672000-memory.dmp

    Filesize

    520KB

  • memory/2068-44-0x00000000005F0000-0x0000000000672000-memory.dmp

    Filesize

    520KB

  • memory/2068-45-0x00000000005F0000-0x0000000000672000-memory.dmp

    Filesize

    520KB

  • memory/2068-46-0x00000000005F0000-0x0000000000672000-memory.dmp

    Filesize

    520KB

  • memory/2324-0-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2324-14-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3616-24-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/5024-25-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/5024-39-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB