Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 17:48

General

  • Target

    NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe

  • Size

    76KB

  • MD5

    1baaf4bfd7943e427e3d0e472f4119d0

  • SHA1

    8f174f4f282f43af4758454fd46e0427be90c6fa

  • SHA256

    9a4c4098645829ae3b5f7830fedd58798ebbf96f0173c90031de1a0d943340d4

  • SHA512

    45c6d9efb75c2dbde50298660135a9bcfa57023873f12388f47c1faa1a65145eed319daf80b7dec82a524439d840d65194c1ab104e296cbffad22c21dec6e8cb

  • SSDEEP

    1536:jIr3YriYiUi+H++o1eVlXd+8c0GXmvJJNHjLwl50fPGX:jyYti0pXd+8c0GWvJ3Hvwl5l

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1baaf4bfd7943e427e3d0e472f4119d0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      PID:2252
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    93c65a2d29a3f6fc7c703df149637d7f

    SHA1

    a4a27b2eec41990a52a2920818cf940e80fa358d

    SHA256

    75921ea4058e7f9781fed2c5fe0263052d5eb3b192cf5f9fc0e314487d41d5db

    SHA512

    7a22bbda614ee62db2b90a970b6ce67f54fbd7fe6babd77977c0c712d65544db698e7390f97b533912b660ac8f92b05d21d60d07e014a1e1810d25faa24ab176

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    76KB

    MD5

    fcc395a83a66b4bbe334559989404de9

    SHA1

    3156b54e9d0e0531aae8b49a986097e375838b8d

    SHA256

    d9be7c9332b454156b6acae0738526520d4314062435c05d51bed30128481077

    SHA512

    97ce3b8e9e7b715e898359e3b10f76da2dc246e03852603c9d4887a518054a6c7bdc44aba8bcbb8899354706f7809e795f92ced6a994dbe67bb89c0bc265ab8b

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    290B

    MD5

    2829016e1543e25208f35abfdcd1d194

    SHA1

    e5161f37954516b7890803958b86319e2ad423ed

    SHA256

    b79e1f32da9646465f7235158e73edaaad259fe47e38e2ca0d3122bffe9acff3

    SHA512

    d7031ab1f94e3eb4ff39f8cb630011934f0fb9ca723aad8d5f9ec488d77f1a0cb23ecc3b6e4dadb2aba40252e2869bacbc5757a69d76894c26346d5fc11d0338

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    290B

    MD5

    2829016e1543e25208f35abfdcd1d194

    SHA1

    e5161f37954516b7890803958b86319e2ad423ed

    SHA256

    b79e1f32da9646465f7235158e73edaaad259fe47e38e2ca0d3122bffe9acff3

    SHA512

    d7031ab1f94e3eb4ff39f8cb630011934f0fb9ca723aad8d5f9ec488d77f1a0cb23ecc3b6e4dadb2aba40252e2869bacbc5757a69d76894c26346d5fc11d0338

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    76KB

    MD5

    fcc395a83a66b4bbe334559989404de9

    SHA1

    3156b54e9d0e0531aae8b49a986097e375838b8d

    SHA256

    d9be7c9332b454156b6acae0738526520d4314062435c05d51bed30128481077

    SHA512

    97ce3b8e9e7b715e898359e3b10f76da2dc246e03852603c9d4887a518054a6c7bdc44aba8bcbb8899354706f7809e795f92ced6a994dbe67bb89c0bc265ab8b

  • memory/2252-20-0x0000000000EE0000-0x0000000000F1D000-memory.dmp

    Filesize

    244KB

  • memory/2252-22-0x0000000000EE0000-0x0000000000F1D000-memory.dmp

    Filesize

    244KB

  • memory/2252-28-0x0000000000EE0000-0x0000000000F1D000-memory.dmp

    Filesize

    244KB

  • memory/2576-0-0x0000000000F80000-0x0000000000FBD000-memory.dmp

    Filesize

    244KB

  • memory/2576-6-0x0000000000EF0000-0x0000000000F2D000-memory.dmp

    Filesize

    244KB

  • memory/2576-17-0x0000000000F80000-0x0000000000FBD000-memory.dmp

    Filesize

    244KB