Resubmissions

26-01-2025 03:48

250126-ec5anasnaj 10

26-01-2025 03:44

250126-eal2as1jdz 10

Analysis

  • max time kernel
    30s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 03:48

General

  • Target

    bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe

  • Size

    505KB

  • MD5

    e8c2d1a78d3f6c19c06a82c8fa661946

  • SHA1

    3dac0a7c3a8b17bb26283fe5e0f1f2547dc161c9

  • SHA256

    bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9

  • SHA512

    f572a0740c2c823c3768fe89beebba122ecee8f6c036395908a7b37c2b64885ae1bcc8914e66b3eb97763a779463b3797d12d75eb1f9cfbb3cd6b2d4c8ee7ab9

  • SSDEEP

    12288:N/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFO:N/D0caF8wvhb43pDbO

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.30.235

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe
    "C:\Users\Admin\AppData\Local\Temp\bcad497975477a792314eab89093bafcec62925b46d919d34624a3549588c1c9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\zyxuo.exe
      "C:\Users\Admin\AppData\Local\Temp\zyxuo.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2304
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    470456365dbdf08d67a707931b70b423

    SHA1

    c1568446d3a6daf6e08ba343e1111b6f8cbd83d8

    SHA256

    f0596ed299657ca0cc56dec4c2a6b056517a5697264f6fb5ae0f2df1f4995610

    SHA512

    eef7c083f488e0161fef9dcd2dbd36821fa29c62407b0a2ceef20beef94dcf00969070314c9118237871075d0b60f43368795402236eb96c48cf3085489dca9c

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    c2a463aada7a1780b7a34059651b2a86

    SHA1

    eadfe82fa051aaa53deee771931b52c6ce027ab5

    SHA256

    96478eb8cb7f40732a42767bc790f6e2f6001e2b4a60a9a10cea83af7951d891

    SHA512

    23ac8d2ebad575aaeaddfbaafdbeb462942467aa18da3e70554fa311bb66656605788495328ea92a9db3cbe983c7cd781ade88e75ba8401551bf2cd294c2c1be

  • C:\Users\Admin\AppData\Local\Temp\zyxuo.exe

    Filesize

    505KB

    MD5

    e9fab0760a20c457f1b7e017915f9590

    SHA1

    9c75e14d7a75adc911f55812a96830c9e73ffe57

    SHA256

    071ca89ff65984e5a5e307908848d36e7dbe0e72af6f190f44093c48bec96431

    SHA512

    1a4e89a7c19d3ececb3ee136fbefcf334ddb2826569c05343d1e115233a9759420691b7083abb3664c6b4086f7e45b22e95955eaa20db937c6facfafb5dd98f1

  • memory/2304-17-0x0000000001380000-0x0000000001406000-memory.dmp

    Filesize

    536KB

  • memory/2568-0-0x0000000001020000-0x00000000010A6000-memory.dmp

    Filesize

    536KB

  • memory/2568-18-0x0000000001020000-0x00000000010A6000-memory.dmp

    Filesize

    536KB

  • memory/2568-16-0x0000000002840000-0x00000000028C6000-memory.dmp

    Filesize

    536KB