Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 17:04

General

  • Target

    fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe

  • Size

    338KB

  • MD5

    d4f84cfe896e1c29f6a5f32291e3f5f0

  • SHA1

    c8a9f5efad1e6e4fb33fde015d5baca8de03e98e

  • SHA256

    fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16

  • SHA512

    664f50bb70540093bdc592b929b9b8d0d7ddc116badf24ddca8a049f8c648d5a69cfa4cb38fc1b2282edb8185a3bf0c8f858db2ef039b157d87e4002e26f4dfa

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcKo5pN:vHW138/iXWlK885rKlGSekcj66ci8

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe
    "C:\Users\Admin\AppData\Local\Temp\fea5384e93b8ba44ec51041545eefbaca16cd67fc5acb0a106ff6ccb8a11ac16N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Local\Temp\zaowx.exe
      "C:\Users\Admin\AppData\Local\Temp\zaowx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Users\Admin\AppData\Local\Temp\touss.exe
        "C:\Users\Admin\AppData\Local\Temp\touss.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2280
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    342B

    MD5

    8df63a479fe943d1cd0889f78578bcc4

    SHA1

    2e3c4709c101483ff6a957cf663547302fbf6044

    SHA256

    44d061a9f0f95cec27c521183ffcd27a19d9254ecfe37ffd25c6e68b621407a7

    SHA512

    aa22e55f16de8e7d01cf78b505eb371f4149c662b9b7b6550f238a1d3bd1b7f934904c38d824b2b5d7ddedaaa98c64501b1ff06488ed2703eef97dd28e850b50

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    39319960c782a32700f0f7334d70f9a2

    SHA1

    ca8421a6f9708a8ad743619d2f8c9130cc795498

    SHA256

    c4d2793fdf14e67157c15a0ccb1e9498341482993a709e6e9189def647724473

    SHA512

    f21174f50a0a9c00f18984796a46c99efdfb68ed07a55b2a5daa0c3c9bccadde7373b54af51f91c84ed19a579284874b15dd9c3a92b8270d3f33d9310662d1d9

  • \Users\Admin\AppData\Local\Temp\touss.exe

    Filesize

    172KB

    MD5

    c5a122d87f76bfd9cab9d136f28a45d3

    SHA1

    6f4addb05fd4e5539e175fd574901bba68dc138f

    SHA256

    067ab7a5efed848fa453707766c22be429165d0b0f52eeae557bed01b4a25ebe

    SHA512

    122492dae9d1f94259d4805d9f9912aa2110fdea5b573ddd22781557fc44dcea04a5e72771066ebf74722d8f5033be1cbd9bc8dd783ce031d637434af1d31e55

  • \Users\Admin\AppData\Local\Temp\zaowx.exe

    Filesize

    338KB

    MD5

    f99ac5c667e595e9d92ae9dc0d0679fc

    SHA1

    f1ad82a3fb15b7220344fc463f388a48b7e04442

    SHA256

    066dd362876af582ee3adfcd9ded4fe3833384661003712412208ade55aa288e

    SHA512

    ff91bd681654a21dddb50ca669874d87e0446d0a83147406bbf4b9ecb7e68cedea27cec075dd9743d58d57116aaac057e7aff78053e711af1c2c15950d7b83d0

  • memory/2280-44-0x0000000000F30000-0x0000000000FC9000-memory.dmp

    Filesize

    612KB

  • memory/2280-41-0x0000000000F30000-0x0000000000FC9000-memory.dmp

    Filesize

    612KB

  • memory/2280-46-0x0000000000F30000-0x0000000000FC9000-memory.dmp

    Filesize

    612KB

  • memory/2280-47-0x0000000000F30000-0x0000000000FC9000-memory.dmp

    Filesize

    612KB

  • memory/2884-19-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2884-18-0x0000000001300000-0x0000000001381000-memory.dmp

    Filesize

    516KB

  • memory/2884-23-0x0000000001300000-0x0000000001381000-memory.dmp

    Filesize

    516KB

  • memory/2884-38-0x0000000001300000-0x0000000001381000-memory.dmp

    Filesize

    516KB

  • memory/2884-39-0x0000000003670000-0x0000000003709000-memory.dmp

    Filesize

    612KB

  • memory/2956-20-0x00000000001B0000-0x0000000000231000-memory.dmp

    Filesize

    516KB

  • memory/2956-9-0x0000000002D00000-0x0000000002D81000-memory.dmp

    Filesize

    516KB

  • memory/2956-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2956-0-0x00000000001B0000-0x0000000000231000-memory.dmp

    Filesize

    516KB