Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 07:40

General

  • Target

    5085669c7ebe8a60cd39dbe9c8d10d1d2d1aa370f635d4461636bf5a47114881N.exe

  • Size

    94KB

  • MD5

    9647fefa1bd11c353e52678626ecd180

  • SHA1

    55d857d317b611fa82fa9fa3b071cf49452cac80

  • SHA256

    5085669c7ebe8a60cd39dbe9c8d10d1d2d1aa370f635d4461636bf5a47114881

  • SHA512

    5c4e402ae12d26aa0d4a0ed9e51f656398765f56cfd77e2e2bd4696a910f447ac5c9e4f59bc8862b245480f5ed6d1c987920aa2ddf47ed0c9869733b8e5826ed

  • SSDEEP

    768:tp0ti4HnnhtwYbJy6rioyelmd1TzulQEDDPOwc5n5uNCT/jhhLBxQIwqepJZU9mO:tWzhtJbUgHoADDIx1hLfuJrO

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5085669c7ebe8a60cd39dbe9c8d10d1d2d1aa370f635d4461636bf5a47114881N.exe
    "C:\Users\Admin\AppData\Local\Temp\5085669c7ebe8a60cd39dbe9c8d10d1d2d1aa370f635d4461636bf5a47114881N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1928
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    16c2bcf1dae729c5cb36a1875efe354c

    SHA1

    775fbf4b6a2e5bc033b86cfc0893250b5d387a45

    SHA256

    796a881d71234f7fcd9f5220c6e5674e231610bbf37626d9e5b79dc3268b7bb4

    SHA512

    d8bd6cb6cb6ccd3c2cc40edde9cd3e8c09d1ae55c21ac1896325c324c08507e68c16d3864923806d29db79c57b958dac68e43bdcf809c0a2c8b5b0a7b8557177

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    94KB

    MD5

    3c07f55e4c876a8d75f8d8917860c8bd

    SHA1

    ffb47b3cec1dbc910bd623c966adb2a0a28c7c03

    SHA256

    c617ad15e003c7d6a07ca50cda57c1a4dc8b37363b85788a973bc12c631c3016

    SHA512

    11c1b100f8d9d5deca39c8d46173a8dfeddd98b240da767ab6c4010219191d03b47fe826476c43aa3398e75e5eb15503486841843645b2a23414143f7c630916

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    e5b434cfb593ee3959eafe7204db2911

    SHA1

    ecb2b4cee8bfda3c31819b589f8c6483d88f34f4

    SHA256

    d656cefbbd1b3ceeeaad920b3edd62f59ea9dcfd4d08815c2ad56e38ace598c7

    SHA512

    60e09c823aa941531395767e849ff0c71551d9d94ea6b0957c1b221418cad8dd68950999ecd6ea23f7fc1bdc5c8276291ad469b8cead455cdb9f2f292e2e6d30

  • memory/1928-11-0x00000000010F0000-0x0000000001120000-memory.dmp

    Filesize

    192KB

  • memory/1928-22-0x00000000010F0000-0x0000000001120000-memory.dmp

    Filesize

    192KB

  • memory/1928-24-0x00000000010F0000-0x0000000001120000-memory.dmp

    Filesize

    192KB

  • memory/1928-31-0x00000000010F0000-0x0000000001120000-memory.dmp

    Filesize

    192KB

  • memory/2532-0-0x0000000000BA0000-0x0000000000BD0000-memory.dmp

    Filesize

    192KB

  • memory/2532-8-0x0000000000410000-0x0000000000440000-memory.dmp

    Filesize

    192KB

  • memory/2532-19-0x0000000000BA0000-0x0000000000BD0000-memory.dmp

    Filesize

    192KB