Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    162s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 21:42

General

  • Target

    78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe

  • Size

    336KB

  • MD5

    25c58eb932724a40ba440ab0da42c526

  • SHA1

    8fb69b4b550599d0a4d9a50b07ad43a5bc461dc9

  • SHA256

    78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb

  • SHA512

    d96f098b0e951d26c4fb440e11c0bfe0e3d8971c9da157cc7cbdacf6c666cfe3ceecf1ecaa9c7a559181d1ce3137e2bd37fb376dc89099c03300c7b7395c156e

  • SSDEEP

    6144:GLtOexihqv4m+lXD6betiTuBMTWjIDIiUBAkW9UOKMOtzWO8CatspddOE:GL1D+IatauBML42MykRa6j

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe
    "C:\Users\Admin\AppData\Local\Temp\78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\xoobn.exe
      "C:\Users\Admin\AppData\Local\Temp\xoobn.exe" hi
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Users\Admin\AppData\Local\Temp\hihyvy.exe
        "C:\Users\Admin\AppData\Local\Temp\hihyvy.exe" OK
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3560
        • C:\Users\Admin\AppData\Local\Temp\uvzyv.exe
          "C:\Users\Admin\AppData\Local\Temp\uvzyv.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2152
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
          4⤵
            PID:1784
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
        2⤵
          PID:2760
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4820

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

          Filesize

          340B

          MD5

          d6e2a6cb1d0783111ea2a0fa14bae8b9

          SHA1

          c0eeda318dfeac00d9449551286dde86a103a9b2

          SHA256

          b71439d31a9d550e481d69dc9e7be766616c91be6d9d4135e28cf8c3f08d2dcb

          SHA512

          45c92191a15b90961968f07b520cff8bace442449d637b30b8c72697f01a34800808b40cceba297f9d5c259f708ad5b67a380cb7903edc2c5bf0291a3f72114d

        • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

          Filesize

          224B

          MD5

          bfca78cf772b7f5c02f4afa27542f039

          SHA1

          91f726184edc3c9b8ea43cae9bcbaffbfea0a206

          SHA256

          7f7acbc6121e55191303f51c3ca5af2069b2878421c5ea3d94495b44d1525d97

          SHA512

          e17ee29f0db7b2afe82eff48a12b112d33c55f5103215cda92e2d7ac5b779f3b8d481efc80ffd08e47a54c6399822a659461011915c5a4f13ce46d77509e2da4

        • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

          Filesize

          512B

          MD5

          a33647fd5e5b7915cdf6e9523ab45cd1

          SHA1

          e4069e0e1ee3ea7d1398a0df40bfcf7d8d206e3d

          SHA256

          d4acd6efe7505f380f900b35ff031364f11005aa4f5cbd17ce133cff2940996d

          SHA512

          ed1818bfcdae0db369cd543242f424a6dfe3b8221e9949188ad44c92c5649926667eb8d3da344672d8b79a47174208fbef1356327b58a1bf52f57f5e148c3623

        • C:\Users\Admin\AppData\Local\Temp\hihyvy.exe

          Filesize

          336KB

          MD5

          cff6ddfc40e7581e16827e1bbd3ecf82

          SHA1

          86286fcb7f297f98a588cf468f7dc58a4545822f

          SHA256

          c96d6bc2d795303959be1fbeef4a5473aeaf5e3e91c32b837721f11ce156c46d

          SHA512

          387068351a1834ae9480d3ab859606f7ea472afa16f8c24d9b6a74e6111702969de03c08e60d1fd12316d1375c72577084fd8f514c1cf111e06c7287d8376d73

        • C:\Users\Admin\AppData\Local\Temp\uvzyv.exe

          Filesize

          223KB

          MD5

          43a112a19dfa20fb99889a67237041ec

          SHA1

          b79acc0c8ca5a14239c21cbe66a6f47d820f894f

          SHA256

          6b92552fe98666a4ada8df09e8b79d8209aaff77da7330bf2c99e6ac58626931

          SHA512

          20efebbd32a4df9f5017ce8a440a85c0ba989efa04d1e04840f9e59b0b62ddfd6e098ce68fd26d90019aeb6109bf69cd800645e4e83f0c0a31f44a85f746a072

        • C:\Users\Admin\AppData\Local\Temp\xoobn.exe

          Filesize

          336KB

          MD5

          402c9774e236ed0d3144985eca466cd4

          SHA1

          2182d4dafeb1554cbf210c23ff96f2b398a36f5c

          SHA256

          5f9f961a824657f11ea2399e1aea46d60383e56f8df4aac8c99cd1645d3284b4

          SHA512

          63af0ca2dd5168a349092ca9d80137098c90d60424e1300934747efea42f12f616e5dbb945de7d4f590d5e8a7c1ec2533d39c0962548c7d97af19e5c89ff9e18

        • memory/968-28-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/968-13-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/968-12-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1628-8-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1628-0-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1628-19-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1628-1-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2152-56-0x0000000000C70000-0x0000000000D10000-memory.dmp

          Filesize

          640KB

        • memory/2152-49-0x0000000000C70000-0x0000000000D10000-memory.dmp

          Filesize

          640KB

        • memory/2152-51-0x0000000001200000-0x0000000001201000-memory.dmp

          Filesize

          4KB

        • memory/2152-57-0x0000000000C70000-0x0000000000D10000-memory.dmp

          Filesize

          640KB

        • memory/2152-58-0x0000000000C70000-0x0000000000D10000-memory.dmp

          Filesize

          640KB

        • memory/2152-59-0x0000000000C70000-0x0000000000D10000-memory.dmp

          Filesize

          640KB

        • memory/3560-31-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/3560-54-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/3560-30-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/3560-29-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB