Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 21:01

General

  • Target

    200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe

  • Size

    59KB

  • MD5

    70cd4a5c55eba9390954b36f80804930

  • SHA1

    aed798f1974309adccb7a022d5614a835977ee86

  • SHA256

    200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42

  • SHA512

    ed22cdb09c3e1a6bbd118345fd8d34e0dbe27435b26d74ca16fce6018c8081cd4e73155de0801747caccf17fced8f065ff96cb52cc0819676aeb042911ce8620

  • SSDEEP

    768:jb4zb59Yix/RoyH+5flZirYqc97vFvrpaZG3DHvTdA9GgnOuS5Z3WXcKIZx5uDt:jbQx5oPsr2vFxDPhAvzgdWLIZ7yt

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe
    "C:\Users\Admin\AppData\Local\Temp\200e33e4c1a9b371c66ddbb036b92279e3ed2f65e81752c9b4e29a471c16bb42N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2620
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    59KB

    MD5

    b6634f9cc959d7ad40df4580e37a8787

    SHA1

    00c36e4d006373bfb42314c4ffb1d8452f0ed919

    SHA256

    35cc3250d9744d5c99d7c44d0c62abd85a425cada5fe7a8074d972bc13f17733

    SHA512

    6881cd12b1ddd4d845718ec2052b2c014e557b5ae3671b309e2cb9eea04bb64132989f01880f849e9a7555921d53d34e77b9fd78f993db05bcc7cb5da419599e

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    f02bf69ff6351970bce3b50742a769ed

    SHA1

    577db2279b6489628583d770f441f3316ff2a560

    SHA256

    df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0

    SHA512

    42a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    42d416e7544b1cdd5fcd0ca88f92a145

    SHA1

    5e4998fa5e373840fdd6b60cd6311261f576a06f

    SHA256

    1453a9eb20c048bab5c27c3c86623052825243ff7ea90cd35a87ee637a9f23f8

    SHA512

    1c4c884ecf2c40b69c54f0fc78b7b68b4c098e7f7e8f973101a2bd0e631f3f81fcc846cf47ea96e9541baa2ceae87b6df5471afb498e524bfcf7e1a15b03bcdd

  • memory/2344-0-0x0000000000BA0000-0x0000000000BC5000-memory.dmp

    Filesize

    148KB

  • memory/2344-9-0x00000000004C0000-0x00000000004E5000-memory.dmp

    Filesize

    148KB

  • memory/2344-19-0x0000000000BA0000-0x0000000000BC5000-memory.dmp

    Filesize

    148KB

  • memory/2620-10-0x00000000003C0000-0x00000000003E5000-memory.dmp

    Filesize

    148KB

  • memory/2620-22-0x00000000003C0000-0x00000000003E5000-memory.dmp

    Filesize

    148KB

  • memory/2620-24-0x00000000003C0000-0x00000000003E5000-memory.dmp

    Filesize

    148KB

  • memory/2620-30-0x00000000003C0000-0x00000000003E5000-memory.dmp

    Filesize

    148KB