Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 06:15

General

  • Target

    653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe

  • Size

    93KB

  • MD5

    9ad3c3f8b3ea9acc79311422bb59d2da

  • SHA1

    97f19c8de3bae716769a8c5a4943df974b578b6d

  • SHA256

    653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce

  • SHA512

    08fa0bb96d4e0bec84704b557323d19bd49db12aadf522c63ad2d5e2d8f5f94bd5ea248ad8fd36c2485892f535fdb8bb64b05168426953eaff8a35ce7e07f1d0

  • SSDEEP

    1536:iDJj/L6UWX/iDdolO4g033dsA2+n1qn1iLdB6XC:iDJj29G4gItR7n1qn4LdoC

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe
    "C:\Users\Admin\AppData\Local\Temp\653e5c630d326fb3e5881ac6887c1b382d76afe32e7445688793746edc3977ce.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2760
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    bd60c62717a862c75bbe8c97f365be39

    SHA1

    bf0957b47d8a44f51f9e9680c4e06710edc91b1b

    SHA256

    40afdaa0bdbd385e5c0f0c0899eb8dc107877ab9d815d7b8885bd4c3f1e34873

    SHA512

    8d2fc5df78c3badb96ec1c1126366c25a235f9487b7a6754abf9d9b47ece7a70a187b45ada732aa14f63f1f9520b01432f0ba1b752775e26fe8b892848a01825

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    2f02154156e741e52ed4f4d309714011

    SHA1

    b1b17f1772547bc5f49455957124ce96036fa881

    SHA256

    ea31404127be0a9327592deb9b3d8b4046c2717556cd5b990be269b80396bf9c

    SHA512

    78e774e931c10c5ed9d186451aef178e53fbcc58116c9d68d79b879e92737b4be964b35ac180eb6a2694eec9d24687e1b72f6a4f1fa96f97ea117d0f389f902c

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    93KB

    MD5

    80d63de464dab72a637f700fc4a1ad6d

    SHA1

    656a02ea30c71c8ed26f09da9d41bff550626ba4

    SHA256

    913d2455c4e61cf65ad413447b86913fc861e7a3ca1bc737102bbf0d5ab38ef7

    SHA512

    7ed4f8b304d9b6e0b4127ba0f993183a7f3688109bd3515c08caf4155055f14ea8592db21f35389fcd9a87c0f94e1d6473d23dc114b8c633ba1798054ff0b3a0

  • memory/2760-21-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2760-23-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2760-30-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3052-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3052-8-0x0000000001F70000-0x0000000001FA8000-memory.dmp

    Filesize

    224KB

  • memory/3052-18-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB