Analysis

  • max time kernel
    119s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 05:03 UTC

General

  • Target

    4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe

  • Size

    338KB

  • MD5

    f8859f15a4d4487db21bb5be15231470

  • SHA1

    7b09194ce75e78b96a06d806280449d701961300

  • SHA256

    4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84

  • SHA512

    e97ab670f8df2e03e834e6cb068bfec1e19b816daf31b6aaabf40161472ae306d281f4e387c5d76090876d6882bc6680d336264118371f6ea2c03f1760e28db6

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKogi:vHW138/iXWlK885rKlGSekcj66cie

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe
    "C:\Users\Admin\AppData\Local\Temp\4ca6998d794fd62cf03483bbe92b54f7b59b4d132e779529a54377717d241d84.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Users\Admin\AppData\Local\Temp\exbir.exe
      "C:\Users\Admin\AppData\Local\Temp\exbir.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Users\Admin\AppData\Local\Temp\uzvup.exe
        "C:\Users\Admin\AppData\Local\Temp\uzvup.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1052
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1968

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    167.173.78.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    167.173.78.104.in-addr.arpa
    IN PTR
    Response
    167.173.78.104.in-addr.arpa
    IN PTR
    a104-78-173-167deploystaticakamaitechnologiescom
  • flag-us
    DNS
    217.106.137.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.106.137.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    57.15.31.184.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.15.31.184.in-addr.arpa
    IN PTR
    Response
    57.15.31.184.in-addr.arpa
    IN PTR
    a184-31-15-57deploystaticakamaitechnologiescom
  • flag-us
    DNS
    168.100.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    168.100.16.2.in-addr.arpa
    IN PTR
    Response
    168.100.16.2.in-addr.arpa
    IN PTR
    a2-16-100-168deploystaticakamaitechnologiescom
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    48.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    48.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 218.54.31.226:11300
    exbir.exe
    260 B
    5
  • 1.234.83.146:11170
    exbir.exe
    260 B
    5
  • 218.54.31.166:11300
    exbir.exe
    260 B
    5
  • 133.242.129.155:11300
    exbir.exe
    260 B
    5
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    22.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    167.173.78.104.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    167.173.78.104.in-addr.arpa

  • 8.8.8.8:53
    217.106.137.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    217.106.137.52.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    57.15.31.184.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    57.15.31.184.in-addr.arpa

  • 8.8.8.8:53
    168.100.16.2.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    168.100.16.2.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    48.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    48.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    340B

    MD5

    3a87d228cd7ac1503813e8c4dcb295cb

    SHA1

    4c21092a9a916949b2577c24a4e051d7741b74a4

    SHA256

    491f65dd41d09015edb38abbd12a2f37b73667f1c14afcf0a04d7216f4fc68be

    SHA512

    18c8512555481600e63ce07aefb38048896ffaaa1b7f90d508594cfc05ebb00b989b7a8f87b915c9c1c2fb3b17ee3bccf278a36b31f7036cdff570a31778f12c

  • C:\Users\Admin\AppData\Local\Temp\exbir.exe

    Filesize

    338KB

    MD5

    b48653337db9aa0cefe5902f14b09842

    SHA1

    acc70d8f95ada4629df4a5eb885c72ba911ef61b

    SHA256

    a59d872cd724d4aa005f1e7e914bd61ea00c19cdc94909e62f964a5ac396cb58

    SHA512

    54538ff755fd06f9c32ab19eba713c016e21f3d936d252d7e0a7be8ae55f12d7a8084d5a6186a0bf255cdc92a9100703e631addb23fa7d4c9a3c88e0c6022db5

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    26f63ca396cb4f192f09006cc8ed0e0f

    SHA1

    1feb6af13bfd5e9c5f0fe026114311c941eea9e4

    SHA256

    541393efed2429b9067a2bc026e80f76be3286033b16fdd41d8e5fbe548438c1

    SHA512

    b3c170e5a9e3c8457e3fd28de0b9ca9e5c0a8f7d62acbae4891da65d3eada590c53df9e6ee10337adf4db1be3d494ea12821d13cf347a20b09949d048516576c

  • C:\Users\Admin\AppData\Local\Temp\uzvup.exe

    Filesize

    172KB

    MD5

    9b12f7f35d2e4b01c468202407fe388d

    SHA1

    8437ac2d9a15d8f0bb279e0cb9c6202ca2e55b59

    SHA256

    41529007bb8199c112fa7dcd97a434049839e3fc25372b32ed30793e631c36d6

    SHA512

    e788935281c1724b34d05536490b6c54e986bfd6fff1b6c2022a5f0f6ab4347c87af77caccad3d1c2947be96245ec3572882c8ca8561346a16d84bdd7545afde

  • memory/1052-48-0x0000000000600000-0x0000000000699000-memory.dmp

    Filesize

    612KB

  • memory/1052-46-0x0000000000600000-0x0000000000699000-memory.dmp

    Filesize

    612KB

  • memory/1052-41-0x00000000007A0000-0x00000000007A2000-memory.dmp

    Filesize

    8KB

  • memory/1052-47-0x00000000007A0000-0x00000000007A2000-memory.dmp

    Filesize

    8KB

  • memory/1052-37-0x0000000000600000-0x0000000000699000-memory.dmp

    Filesize

    612KB

  • memory/1052-42-0x0000000000600000-0x0000000000699000-memory.dmp

    Filesize

    612KB

  • memory/4128-17-0x0000000000170000-0x00000000001F1000-memory.dmp

    Filesize

    516KB

  • memory/4128-0-0x0000000000170000-0x00000000001F1000-memory.dmp

    Filesize

    516KB

  • memory/4128-1-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/4756-20-0x0000000000920000-0x00000000009A1000-memory.dmp

    Filesize

    516KB

  • memory/4756-40-0x0000000000920000-0x00000000009A1000-memory.dmp

    Filesize

    516KB

  • memory/4756-21-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/4756-13-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/4756-11-0x0000000000920000-0x00000000009A1000-memory.dmp

    Filesize

    516KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.