Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 03:56

General

  • Target

    8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe

  • Size

    138KB

  • MD5

    cb8e65a5e75981aa5da1ab661821ee88

  • SHA1

    e1334456b7bef3ebe043591dccecc0dfb41058f3

  • SHA256

    8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178

  • SHA512

    a4307b8d867beee1a0502f4bf51e14c97e98e2f36a9811b37c40269735cafac1a23c065a3ac8fa84fd80df4c538fa83a73a4fb91b720fc03961623d6d081d673

  • SSDEEP

    3072:VUhMsp+K1OXZjftqRO6DL/qHR4oBvsA7Ipr308dU4GU:VUhAOOt84Rh9KEi2U

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.208

112.175.88.207

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe
    "C:\Users\Admin\AppData\Local\Temp\8221a4675d4839366cc13426056950a2742201f1da65cb7f8729d5017a16d178.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2836
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    a2de452e45db47c817b5ada178bd2e83

    SHA1

    44b16b5c0e400a2af95299d0c08a6a4fda14bc4c

    SHA256

    516ba3f510ebfd821b47f63ac2c47faa15d5f2ba8732c79c0265fa8aa3ad8fd4

    SHA512

    8799d95d502764a4266c37c1c5fbb24fb9ab94983310962deafd5e246c5900993dffb2c2b06ab6709cc4141aab3346a9cf65b2a62744dbf11c7d381af654be85

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    dadb2e56ee33e5be410a837952a72ab5

    SHA1

    7cba74617b4c572f23e664f4bd2f4d121e2130f7

    SHA256

    d8a2ba3b4cb071da36cc48a340197eef8706a9c7f20a66cd58d98f221ef6244d

    SHA512

    e5a0f7dc9d1a151b0efdf07026d005aa052101441deb11c60beb2518a39179b2a9986bf507b09b063de09ad2b3e31a4cccd32c6745d589c01726f6cdd731ac65

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    138KB

    MD5

    40dc93d800238ef9b29780a8f182df1e

    SHA1

    c2623780aa5e7ab170b572966ba544fccbbcd949

    SHA256

    a3244e629f8e695d219731cfd4086dfbb101967591434983a3ab4afa5d2021a0

    SHA512

    7eaf680452fbafafa006d79db98a5d5a1352c20a3dbbc391c89dee1b1d2a895335067d7971024cf0d75409da1c1ebc6a34c6e1b6e8b3a9d5f8cc2a5979907d4d

  • memory/2492-0-0x0000000000820000-0x000000000086D000-memory.dmp

    Filesize

    308KB

  • memory/2492-8-0x0000000001E60000-0x0000000001EAD000-memory.dmp

    Filesize

    308KB

  • memory/2492-19-0x0000000000820000-0x000000000086D000-memory.dmp

    Filesize

    308KB

  • memory/2836-10-0x0000000000920000-0x000000000096D000-memory.dmp

    Filesize

    308KB

  • memory/2836-22-0x0000000000920000-0x000000000096D000-memory.dmp

    Filesize

    308KB

  • memory/2836-24-0x0000000000920000-0x000000000096D000-memory.dmp

    Filesize

    308KB

  • memory/2836-31-0x0000000000920000-0x000000000096D000-memory.dmp

    Filesize

    308KB