Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2024, 06:13 UTC

General

  • Target

    98878d315c1664a568f34e3a1fe96eaa0b5f14e46466e7474cf97be666d242ddN.exe

  • Size

    76KB

  • MD5

    189f93a96da4bc7d1a2f07f4d3a3e080

  • SHA1

    405f770844d637aff4dd0cc666172cef333c4a86

  • SHA256

    98878d315c1664a568f34e3a1fe96eaa0b5f14e46466e7474cf97be666d242dd

  • SHA512

    9207bf6ccda6192f12b49be828ac8c0e1c9fb07c205d5827542d5e59d0e728d6c4175f5b1c0d46ecd6206316c86dfec5a9f302417905bbe7f29cde5587b38446

  • SSDEEP

    1536:1D433Oe20lleqbmruXP+9E5KJ+e8Xwhpft:1Dcpl1mrE+EeBJfV

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.208

112.175.88.207

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98878d315c1664a568f34e3a1fe96eaa0b5f14e46466e7474cf97be666d242ddN.exe
    "C:\Users\Admin\AppData\Local\Temp\98878d315c1664a568f34e3a1fe96eaa0b5f14e46466e7474cf97be666d242ddN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1744
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5076

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    74.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    74.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    212.20.149.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    212.20.149.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 112.175.88.209:11120
    huter.exe
    260 B
    5
  • 112.175.88.208:11150
    huter.exe
    260 B
    5
  • 112.175.88.209:11170
    huter.exe
    260 B
    5
  • 112.175.88.207:11150
    huter.exe
    260 B
    5
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    74.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    74.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    212.20.149.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    212.20.149.52.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    43.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    43.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    e9bde5b44e2cc18d88ff2ee2dbc7081c

    SHA1

    b2eba2136f52d53ff3f60541bc79e7b217d0b268

    SHA256

    53c25f3ea9f537bb7d5accae21cbc5c9ef83e4bdf52143201ab08b69403b489c

    SHA512

    573357570a89779fc2984dcc70639460bc8d0cfc6d3a0a37d0623a5804630e804b34671b0f98765b9f7a68b04aa550ffbfd9ca69f6157cff1c826466943bfc8c

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    76KB

    MD5

    9b1da70cb92392cde1c3dfc98a837c6d

    SHA1

    692a2e0e2309db2750f2e9cfbf6e838407ad38e9

    SHA256

    bbcee1d322a9df49096eab5cb3270976dedcdbc03f759169c4ffc919b9172f21

    SHA512

    2a14a73766069cde8d6632c5bfbbdc9e113351b6e6a77aaa973ea249c413382a9c5ecd7566d8be5d2413434751174a2fdf3b66ebb232076153e0e0643fb112b1

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    0d405396d047962ffd18aa052c63c597

    SHA1

    91cebf8b044956482f09cfdb69d8af341ccc2aef

    SHA256

    d28cf1285462047d3266bd8cbc306d495f2be2dfc0dc50306baa650dad528978

    SHA512

    105af2104cc1c19ce5dfec631fa5d525a46f0e7877ea369af1da925fc34d3407e0fff80bdaf2adc947b24f5e3e35b9834ad9d07995ebe8c368ec20603f666769

  • memory/1744-10-0x00000000000B0000-0x00000000000E0000-memory.dmp

    Filesize

    192KB

  • memory/1744-17-0x00000000000B0000-0x00000000000E0000-memory.dmp

    Filesize

    192KB

  • memory/1744-19-0x00000000000B0000-0x00000000000E0000-memory.dmp

    Filesize

    192KB

  • memory/1744-25-0x00000000000B0000-0x00000000000E0000-memory.dmp

    Filesize

    192KB

  • memory/3964-0-0x00000000008F0000-0x0000000000920000-memory.dmp

    Filesize

    192KB

  • memory/3964-14-0x00000000008F0000-0x0000000000920000-memory.dmp

    Filesize

    192KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.