Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 19:19

General

  • Target

    dd49a794911cc9402e712e0e9ffeb0d7_JC.exe

  • Size

    332KB

  • MD5

    dd49a794911cc9402e712e0e9ffeb0d7

  • SHA1

    8b488448f6797440f79c8f8b3742fe63ff52dbc7

  • SHA256

    9af836be97d28f466053fcb064ab98e1c04bc62774b394c5d82fc8b898bc817a

  • SHA512

    0ec4bb119b6149cd04ff097454b90050bbbf05457745b53019681bd5147dcf376af882273bd08808fd88393ad446be704db838a5ab82439e66b954fb9682c3cf

  • SSDEEP

    3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZis7:Nd7rpL43btmQ58Z27zw39gY2FeZhj

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd49a794911cc9402e712e0e9ffeb0d7_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\dd49a794911cc9402e712e0e9ffeb0d7_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\kixin.exe
      "C:\Users\Admin\AppData\Local\Temp\kixin.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Users\Admin\AppData\Local\Temp\gizosi.exe
        "C:\Users\Admin\AppData\Local\Temp\gizosi.exe" OK
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Users\Admin\AppData\Local\Temp\ujtut.exe
          "C:\Users\Admin\AppData\Local\Temp\ujtut.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:5052
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
          4⤵
            PID:5084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
        2⤵
          PID:1972

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

        Filesize

        224B

        MD5

        7ad9635452d1471375751e0b4e1c758c

        SHA1

        6acfda9a96d45895cce23ae7fa28869fd4b40a4c

        SHA256

        bcbb038f029005496505099d8c329ea60c834eb45b335326974831597e20c3e2

        SHA512

        f083dc2ef99add404d33230ad6ce6c3e7f030a5cb80e8de96a37ab831ce4051ef7496be9c5b376233cc4df2a1670e9f0e39b989301d8a501678621caf7263f22

      • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

        Filesize

        282B

        MD5

        a1aec52cdab054617aa595ed3cd584be

        SHA1

        8873127a7136ba52beef1725271d80ccad9f7d35

        SHA256

        53f050b1ba03bc601741fabd65aba819d44c3c92569c083375919967373b081e

        SHA512

        b8b107a0d898b5c346638e731a73eac69f7f1c80330f29fac5cae2b7cba53305fb3b60803caa636406ab88f7caeb9668d8878dc0a1ca9407b06e6c9b842f0276

      • C:\Users\Admin\AppData\Local\Temp\gizosi.exe

        Filesize

        332KB

        MD5

        8af59a97f358134df53dc3be35449ace

        SHA1

        efe23f3b939ee29748278a65077d3300689e3af1

        SHA256

        a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641

        SHA512

        d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1

      • C:\Users\Admin\AppData\Local\Temp\gizosi.exe

        Filesize

        332KB

        MD5

        8af59a97f358134df53dc3be35449ace

        SHA1

        efe23f3b939ee29748278a65077d3300689e3af1

        SHA256

        a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641

        SHA512

        d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1

      • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

        Filesize

        512B

        MD5

        7aed483a959072f476bf7da22fed9c52

        SHA1

        fafffea24fab269390a0a1b502b2b39b171bdead

        SHA256

        3401d67e753943502a2dad93701c5c6ed78fc76e4f49eeca141fffbdcb15e747

        SHA512

        7f418f0f5eb544daccd229af1026d1db660d660066b02a24312282b6db9a379f7b9dd1894d42523515488a7993006a5512584a922bb388ac9bdfbc7e0f852006

      • C:\Users\Admin\AppData\Local\Temp\kixin.exe

        Filesize

        332KB

        MD5

        8af59a97f358134df53dc3be35449ace

        SHA1

        efe23f3b939ee29748278a65077d3300689e3af1

        SHA256

        a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641

        SHA512

        d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1

      • C:\Users\Admin\AppData\Local\Temp\kixin.exe

        Filesize

        332KB

        MD5

        8af59a97f358134df53dc3be35449ace

        SHA1

        efe23f3b939ee29748278a65077d3300689e3af1

        SHA256

        a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641

        SHA512

        d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1

      • C:\Users\Admin\AppData\Local\Temp\kixin.exe

        Filesize

        332KB

        MD5

        8af59a97f358134df53dc3be35449ace

        SHA1

        efe23f3b939ee29748278a65077d3300689e3af1

        SHA256

        a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641

        SHA512

        d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1

      • C:\Users\Admin\AppData\Local\Temp\ujtut.exe

        Filesize

        136KB

        MD5

        d6a55a8012c6f1bb183d909806522b10

        SHA1

        4b2f5bcb1cbe5fa3a8baa4a4564efc2ba6618874

        SHA256

        f9d1a0dca90954d99640ec4d51d1ce708c4b000047a6c4978b9423786ceed850

        SHA512

        af8876186e590efbdd8cc2c11695c773a32aba32f04c3ee2fc555b8305922689c52330ba1556ae5c19905736ac10fa7c9b80b92b4e2c21d6109920c4959dba37

      • C:\Users\Admin\AppData\Local\Temp\ujtut.exe

        Filesize

        136KB

        MD5

        d6a55a8012c6f1bb183d909806522b10

        SHA1

        4b2f5bcb1cbe5fa3a8baa4a4564efc2ba6618874

        SHA256

        f9d1a0dca90954d99640ec4d51d1ce708c4b000047a6c4978b9423786ceed850

        SHA512

        af8876186e590efbdd8cc2c11695c773a32aba32f04c3ee2fc555b8305922689c52330ba1556ae5c19905736ac10fa7c9b80b92b4e2c21d6109920c4959dba37

      • C:\Users\Admin\AppData\Local\Temp\ujtut.exe

        Filesize

        136KB

        MD5

        d6a55a8012c6f1bb183d909806522b10

        SHA1

        4b2f5bcb1cbe5fa3a8baa4a4564efc2ba6618874

        SHA256

        f9d1a0dca90954d99640ec4d51d1ce708c4b000047a6c4978b9423786ceed850

        SHA512

        af8876186e590efbdd8cc2c11695c773a32aba32f04c3ee2fc555b8305922689c52330ba1556ae5c19905736ac10fa7c9b80b92b4e2c21d6109920c4959dba37

      • memory/2784-25-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/2784-42-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/3068-24-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/3096-0-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/3096-14-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/5052-40-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-37-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-39-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-44-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-45-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-46-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-47-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-48-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB

      • memory/5052-49-0x0000000000510000-0x000000000059C000-memory.dmp

        Filesize

        560KB