Analysis

  • max time kernel
    107s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 15:35

General

  • Target

    42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe

  • Size

    59KB

  • MD5

    36f26fcaae5cf8d3aa97fe7cf9f0b633

  • SHA1

    d80e1ac4b25d6e1ea8b961fd5f2ec8438356bfef

  • SHA256

    42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098

  • SHA512

    f88cff7f310671a9f6efd3047b9652918cafa3d2923a067c574c15f3d753e42951f9870d8f4a9216354a29096acd01bcc27568a16fc882a92de7b90426afbda5

  • SSDEEP

    768:jb4zb59Yix/RoyH+5flZirYqc97vFvrpaZG3DHvTdA9GgnOuS5Z3WXcKIZx5uDZ:jbQx5oPsr2vFxDPhAvzgdWLIZ7yZ

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe
    "C:\Users\Admin\AppData\Local\Temp\42a51a26f5d4e9959db0b228fe7a17247f8572902056814d7fc09e93229bf098.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    59KB

    MD5

    9c08dbf5b4fa740f61b6ea93a4bc4650

    SHA1

    0ef70e9e1bca89dc9e43bbf5bfdf19d009f64cfa

    SHA256

    77836f344f0d7f28a53c98c106e19a06957d606f40e11bead373d4e84e5029e5

    SHA512

    c08c736d16fdf0d0c703fc750c78d122958e4fe91c52caa3600a4de8a9b4ad297cff92d7dc12716284fba961ddcbb44274f0ce466ea49c4394e3720a28731b20

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    f02bf69ff6351970bce3b50742a769ed

    SHA1

    577db2279b6489628583d770f441f3316ff2a560

    SHA256

    df6e69fc42308fb3e8b6ec778c1ba6afa4ec11d0414c86299df8b573a51f13c0

    SHA512

    42a7fc0af80713ece991b51ce908444414162de5cb704d1e538794db7fca217fe3d9bfde19d7661f62ccd1d8ec3de362675094f364daf48624ace9e9e2239979

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    a24d9bdbd3aeff6356f5c8671cf20eae

    SHA1

    d8aaaf3a9936c01bfb389fae3cd73ef6c82a3696

    SHA256

    9a79179a5b6cafdff07668da12fc3a9870328bfa4b81047bb7bdd04d29180719

    SHA512

    ef9c4ae996eb7fc5c9e3a40506a3c2e55938345fdf42501184e5f4f9f6460ec372e5887a73a3e8dd8e190c1412eeed0e82c725d463dce4bb670c26c509df0c5d

  • memory/2708-0-0x00000000007B0000-0x00000000007D5000-memory.dmp

    Filesize

    148KB

  • memory/2708-14-0x00000000007B0000-0x00000000007D5000-memory.dmp

    Filesize

    148KB

  • memory/3612-9-0x0000000000DA0000-0x0000000000DC5000-memory.dmp

    Filesize

    148KB

  • memory/3612-17-0x0000000000DA0000-0x0000000000DC5000-memory.dmp

    Filesize

    148KB

  • memory/3612-19-0x0000000000DA0000-0x0000000000DC5000-memory.dmp

    Filesize

    148KB

  • memory/3612-26-0x0000000000DA0000-0x0000000000DC5000-memory.dmp

    Filesize

    148KB