Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 06:06

General

  • Target

    9ffab46b35109fa933a6cfa9bf29f2d0N.exe

  • Size

    442KB

  • MD5

    9ffab46b35109fa933a6cfa9bf29f2d0

  • SHA1

    db0dff43c5a01aed1b41a52d0c4d120f95c2997a

  • SHA256

    3bd79093695ed9b423140464a9425194967adc2461ee9e7ae0d8e54eafbb36d5

  • SHA512

    293fa82c84a11cca4738e3460caf5576352ff4eef8595f129fc7b5120ac4b22a01d97f4c7aa8266a93318fcd1f2111ab202379279fab1e267c5621fa7b09db74

  • SSDEEP

    6144:oo3wBi+1Py3V0a2WkRNgi3caOHO5NjEwwiYWB5mV4Pzw9ygibGGM1G:rKf1PyKa2H3hOHOHz9JQ6zByG

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ffab46b35109fa933a6cfa9bf29f2d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9ffab46b35109fa933a6cfa9bf29f2d0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\regiw.exe
      "C:\Users\Admin\AppData\Local\Temp\regiw.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Local\Temp\cytac.exe
        "C:\Users\Admin\AppData\Local\Temp\cytac.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3016
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    278B

    MD5

    318893326a4fa22cd5d08e00af699f27

    SHA1

    9cb06c85a3b49a6e777271784ce9c5e37c903320

    SHA256

    b424291265c436ef95fa4a973b4e987ab42417712c64ee09fc74d4f7d35d0e17

    SHA512

    5dcb0a24e40b05a277cfc94f5c28202bee6819a7d5dfc9ed777c55ee70a777e46ebe113eed8d6ce50a518ff152d5f554cd5c54ef7a864a5908898919c76c4183

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    96a99f894bea64e49ef42d0367add80e

    SHA1

    7190f5d88281d6eed07252fc54f661411d0c44b2

    SHA256

    33c0a3063d277f70e88939e6a08e0d0eefb19ea882d4ed498fe58f7a4141689a

    SHA512

    a5cd692b69ca56ea15f2ef75e3cb1c7df909cf6fb298121726d8781b4a7c30259ca67ac498b9c0424ac6ce0c1762d24d171507898073168c6b087c16353ca7f0

  • \Users\Admin\AppData\Local\Temp\cytac.exe

    Filesize

    230KB

    MD5

    3cf7159c117dc8f42938253c5425c9bc

    SHA1

    e701f3b667c995992b2527acc3b9544e91861307

    SHA256

    826be1922bce52892446f16279b50d5cefcda316c24648ae3cb0e2b596f5ed99

    SHA512

    a67c7af1b9d9a348661c0090fe0d272f9949e1be6730b2255b36fd343b0e234c87cd63f78203619346fca178c777af645894ef094e88723424280bc63ed431c9

  • \Users\Admin\AppData\Local\Temp\regiw.exe

    Filesize

    442KB

    MD5

    42ade1d10051ee74b92ffb68eece2517

    SHA1

    ffcefdc6b959c3409171bc147d983e7cfeabb94e

    SHA256

    3c24d660994af03ee771aab5b7e0772e8fa4b25b74fc22000cc5aa154fa0d961

    SHA512

    1334d9433c1913654095d6165fad99315648713ff61abb5b1df9e8296221f34635736057e25a4912dc8d258d5e1db1053fa9a597e09ef935c3eaa8d50df8fd55

  • memory/2196-0-0x0000000000E90000-0x0000000000EFE000-memory.dmp

    Filesize

    440KB

  • memory/2196-8-0x0000000002300000-0x000000000236E000-memory.dmp

    Filesize

    440KB

  • memory/2196-18-0x0000000000E90000-0x0000000000EFE000-memory.dmp

    Filesize

    440KB

  • memory/2772-28-0x00000000002C0000-0x000000000032E000-memory.dmp

    Filesize

    440KB

  • memory/2772-21-0x00000000002C0000-0x000000000032E000-memory.dmp

    Filesize

    440KB

  • memory/2772-29-0x0000000002040000-0x00000000020DE000-memory.dmp

    Filesize

    632KB

  • memory/2772-10-0x00000000002C0000-0x000000000032E000-memory.dmp

    Filesize

    440KB

  • memory/3016-31-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/3016-30-0x00000000010D0000-0x000000000116E000-memory.dmp

    Filesize

    632KB

  • memory/3016-34-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/3016-33-0x00000000010D0000-0x000000000116E000-memory.dmp

    Filesize

    632KB

  • memory/3016-35-0x00000000010D0000-0x000000000116E000-memory.dmp

    Filesize

    632KB