Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 18:46

General

  • Target

    0001520a394d9725b7b51f73de475b71_JC.exe

  • Size

    97KB

  • MD5

    0001520a394d9725b7b51f73de475b71

  • SHA1

    b68b50a6d7bb32b21748edbb00096488d4d13ba8

  • SHA256

    f3a06452b21736720e832ebc2267990eb02d7a01bde7b2711774b39f47235156

  • SHA512

    64d9738a2b59c8396dabeec425ef2bc2ebbc5e1a38d507c7f931b0e6964a24a88b545a806808ac15cf06babbfb49ec466bf648428c4ebbfc13583204eed07fe9

  • SSDEEP

    1536:OVNSf7hyk+I6412V6PMqAax80XAFSrRV8:SSf9yk+U2V63XAFSrRC

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0001520a394d9725b7b51f73de475b71_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\0001520a394d9725b7b51f73de475b71_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      PID:1408
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:4588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      d8c69e006046149f40585fb3e1bfafb4

      SHA1

      97073fb1d116248dbecd009e4bf873ab45c6c2da

      SHA256

      df1edebe6911c5127449117bdcec2878b0ecaff3e930a37e13aefe54363be228

      SHA512

      b8f5c75fbbddbb185a82395b59f75802cf800dac792c7256261998f3b4a965f180a901f4bd4e873b1cec0ac7acb77e09ec793c8b19ac2d1fdf115e57c42626b9

    • C:\Users\Admin\AppData\Local\Temp\huter.exe

      Filesize

      97KB

      MD5

      16378882418fda97f6f5f1e54afd9da7

      SHA1

      93efe2483859211b6a981744bf4d7db7598d93f4

      SHA256

      2ba708be1ee74940fc048ab1cf2b963a1322f8b2f22ea80b32fd40cb6f16815e

      SHA512

      0393a8026c8400e5fec873eed566bd3404da2dfd052c1e948c32f71f14c17c9a3a0fafcf4335f452e957004b352bf9599d49ec3ef1d6c8b95d4499ad354bdcc3

    • C:\Users\Admin\AppData\Local\Temp\huter.exe

      Filesize

      97KB

      MD5

      16378882418fda97f6f5f1e54afd9da7

      SHA1

      93efe2483859211b6a981744bf4d7db7598d93f4

      SHA256

      2ba708be1ee74940fc048ab1cf2b963a1322f8b2f22ea80b32fd40cb6f16815e

      SHA512

      0393a8026c8400e5fec873eed566bd3404da2dfd052c1e948c32f71f14c17c9a3a0fafcf4335f452e957004b352bf9599d49ec3ef1d6c8b95d4499ad354bdcc3

    • C:\Users\Admin\AppData\Local\Temp\huter.exe

      Filesize

      97KB

      MD5

      16378882418fda97f6f5f1e54afd9da7

      SHA1

      93efe2483859211b6a981744bf4d7db7598d93f4

      SHA256

      2ba708be1ee74940fc048ab1cf2b963a1322f8b2f22ea80b32fd40cb6f16815e

      SHA512

      0393a8026c8400e5fec873eed566bd3404da2dfd052c1e948c32f71f14c17c9a3a0fafcf4335f452e957004b352bf9599d49ec3ef1d6c8b95d4499ad354bdcc3

    • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

      Filesize

      280B

      MD5

      407e33f39006058624c1ac00bf2e7e67

      SHA1

      340ee451d79f9fdca262f1c947c54e676ebbe332

      SHA256

      dd0c60821911b26905cc67a73ed677d4c7c833895355820686fd2ba1b106dbc3

      SHA512

      06d113b2cbd3ce4c0c536cb2aea0ed92ebfef4276f477ae7840d85124a47528b38be254feeaabc680608cf8e59ea6dbfd01b23bda5a232afe45c09fe80e90c5f

    • memory/1408-19-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1408-21-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1408-27-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3704-0-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3704-16-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB