Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 23:08

General

  • Target

    6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe

  • Size

    366KB

  • MD5

    8d485f83022e4be758176248bb551a09

  • SHA1

    a75b23f6102cf0b4ba71590ec1da7f72421d74e4

  • SHA256

    6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619

  • SHA512

    80c45c3eb593ceb284fa513245ffb5c0d5a971795250552d0f1b24959fba1cf5943f7843421b69f945367578db175af1fbd4b74dba7c73d93065288ee76edbfa

  • SSDEEP

    6144:1o3whi+1Py3V0a24kOn+Sr72iyjmhuKtUYiw52hVOcvBRMHkWYHpo:YKf1PyKa2anKjm3OYZ2hocvHK

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe
    "C:\Users\Admin\AppData\Local\Temp\6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\Local\Temp\zikeh.exe
      "C:\Users\Admin\AppData\Local\Temp\zikeh.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4112
      • C:\Users\Admin\AppData\Local\Temp\tozuz.exe
        "C:\Users\Admin\AppData\Local\Temp\tozuz.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4204
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:1928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      340B

      MD5

      319ae29c1070879d12f867d45e6607ce

      SHA1

      04df641032207345c0be275ccef5280af41c5fb2

      SHA256

      a15e8bb02ae31b4f3100a4101fed0f21ec28ab4e8e753902193fb3666c3dd317

      SHA512

      a09116eb0cdc528c98efb29a4c86aa40ffe4a3f1ba5279de36a967246dde08b80a0704674e3d4ce0ee90b0c0483ed85afb5786108230a989f04f072b156f2732

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      7c3375aa639eb5957f2b873f79679af3

      SHA1

      9b583eb0e18b67e520d2915425b46c108e4d7847

      SHA256

      64cb4cd628eb6d33ae3214390e35767fbc902f1007512b2c6e574a72ac8d96a4

      SHA512

      3ead7f543766e906d0de1db6c51f0487b1ea75eb295f91fd96c0d7ab9ef5cc3a9e3fe8947d3263d4a1867ba0baadb52eae34d5ecfbb353363baef31de84c707f

    • C:\Users\Admin\AppData\Local\Temp\tozuz.exe

      Filesize

      208KB

      MD5

      4f59711ba07b3a0bd4bc33adf391065f

      SHA1

      73080f5260900c6e16dbc513e7207c1ba0ed7ef0

      SHA256

      1bb1e2e923fedb746d4c3b73f5d520c898bc090d6341eeba723e9cdb24f46064

      SHA512

      c81721e372614bc3c68243ff6eadfa2b8cce32e43067ac8cfe3bc982612eb200f870b637c9f6ddeab6c2859d1d6cdb5945e3cfb67c0116cb6dc386153886dff0

    • C:\Users\Admin\AppData\Local\Temp\zikeh.exe

      Filesize

      366KB

      MD5

      7e2d42ad6f320fb64b7eecfaec2ebf46

      SHA1

      1e8dfee4b4967f65f3fb3aa6197c16519a4f72e7

      SHA256

      73639b9a501916032c4c39d8b6b1bcc8d59df71398e269d005216c0f1c49cdf4

      SHA512

      1e401df65cb94a486a3b0b9e0b2daaf86fc75ff9557185cc037a6c4bfef8e2325535b47c5c2ffdb7aa4415a14b3b6b98c7d514d5b6f3c47ab8c0600ed020c704

    • memory/3332-1-0x00000000007C0000-0x0000000000822000-memory.dmp

      Filesize

      392KB

    • memory/3332-0-0x00000000007C0000-0x0000000000822000-memory.dmp

      Filesize

      392KB

    • memory/3332-16-0x00000000007C0000-0x0000000000822000-memory.dmp

      Filesize

      392KB

    • memory/4112-12-0x0000000000860000-0x00000000008C2000-memory.dmp

      Filesize

      392KB

    • memory/4112-19-0x0000000000860000-0x00000000008C2000-memory.dmp

      Filesize

      392KB

    • memory/4112-30-0x0000000000860000-0x00000000008C2000-memory.dmp

      Filesize

      392KB

    • memory/4112-13-0x0000000000860000-0x00000000008C2000-memory.dmp

      Filesize

      392KB

    • memory/4204-29-0x0000000000DD0000-0x0000000000DD2000-memory.dmp

      Filesize

      8KB

    • memory/4204-28-0x0000000000A30000-0x0000000000AE3000-memory.dmp

      Filesize

      716KB

    • memory/4204-32-0x0000000000A30000-0x0000000000AE3000-memory.dmp

      Filesize

      716KB

    • memory/4204-33-0x0000000000A30000-0x0000000000AE3000-memory.dmp

      Filesize

      716KB

    • memory/4204-34-0x0000000000A30000-0x0000000000AE3000-memory.dmp

      Filesize

      716KB

    • memory/4204-35-0x0000000000A30000-0x0000000000AE3000-memory.dmp

      Filesize

      716KB

    • memory/4204-36-0x0000000000A30000-0x0000000000AE3000-memory.dmp

      Filesize

      716KB