Analysis

  • max time kernel
    89s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 23:10

General

  • Target

    c7853e63748e21c6eb845740fbb4f5502b43cd667047d55da62eb493aba9daf8N.exe

  • Size

    81KB

  • MD5

    67944d338536626e4adf29717c4e5af0

  • SHA1

    1249d9ee43a1ce4c1a4886bcc1fa3bf91b486016

  • SHA256

    c7853e63748e21c6eb845740fbb4f5502b43cd667047d55da62eb493aba9daf8

  • SHA512

    c4bae1b8f31abd2dd8e9af4849ff924aa40a64bdd03cdb24de6796ccbc89afdd94c90f2a98d7298f40dfd12d1af0f33c2457a3e24c7cefdeb81ab8bd4e6189a4

  • SSDEEP

    1536:UOzC0tKyIy9nOM8e5rqYJkdpzCEw2dnU4qv8v:UO9Ro2rqYyXzCEwG/

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7853e63748e21c6eb845740fbb4f5502b43cd667047d55da62eb493aba9daf8N.exe
    "C:\Users\Admin\AppData\Local\Temp\c7853e63748e21c6eb845740fbb4f5502b43cd667047d55da62eb493aba9daf8N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2284
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    6e0ecec5e285ac121f1bf7f3a59ce016

    SHA1

    d432c8dd0bd3ddfffaa5a22a74c6da08172c13d7

    SHA256

    c1df717fda579031c64433ccadbc1e471654b843121f07f4066b7793355e2dfe

    SHA512

    9c20f07807c92a4bd1808deb68e571fd0ea26f39b6033c8f9e40c0346267aae396ba4ceac427c2daf95d855cca22f05aaeb7ad4f93bd8289972816a55d69527d

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    81KB

    MD5

    244405718cf0c2822f830429af74608a

    SHA1

    8d877bdde1bbf1b0259f34f240e776e573ef8690

    SHA256

    59076265710d18bc3bdde473ac64581d263f20b65a84082756cf914670437e21

    SHA512

    ed2dbaef9a25a78d28a6781a0b667d545734adc6401eee5abcf3e72c671903ffd7322d68ad7e6a9071c42475d856dafc86e996690ff9261074d7f6abc89e5f31

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    52b61f4d6e8ad4f8c3130f9a5244fd52

    SHA1

    5dca26ab4e727d337cca5d8c1a5b60e6c2356261

    SHA256

    076908dc001db4c9d5b3944c232c136d695572a98440d701ac918307fb85a8cc

    SHA512

    4fb438e88351e4cb77b48d7a2098e1c2bf31772f6b01817fc09ebc9542fa2133bc71e7afdb7b6b67c4e9211bf94d45cd2c27792a625dffc92c1c29c50b623a80

  • memory/2284-11-0x0000000000B90000-0x0000000000BCC000-memory.dmp

    Filesize

    240KB

  • memory/2284-21-0x0000000000B90000-0x0000000000BCC000-memory.dmp

    Filesize

    240KB

  • memory/2284-24-0x0000000000B90000-0x0000000000BCC000-memory.dmp

    Filesize

    240KB

  • memory/2284-31-0x0000000000B90000-0x0000000000BCC000-memory.dmp

    Filesize

    240KB

  • memory/2844-0-0x0000000000D70000-0x0000000000DAC000-memory.dmp

    Filesize

    240KB

  • memory/2844-9-0x0000000000B90000-0x0000000000BCC000-memory.dmp

    Filesize

    240KB

  • memory/2844-18-0x0000000000D70000-0x0000000000DAC000-memory.dmp

    Filesize

    240KB