Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 21:02
Behavioral task
behavioral1
Sample
e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe
Resource
win7-20240708-en
General
-
Target
e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe
-
Size
555KB
-
MD5
77cb473575e36fde924b9444f32c5270
-
SHA1
6e67a34d086a38ed35c6e8ce49d6c930f14df324
-
SHA256
e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bb
-
SHA512
ce99cc121968eb509739b8d3466915a6068b991750dc67a795f9986a79a13e655a6710bfca609eee9f8a1102480285cc5155c39660d854722f1fb31803586d0d
-
SSDEEP
12288:++GtVfjTQSaoINAHT1VQ1i3SyQEW85gzlm:+rt4/NArwjs5olm
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
pid Process 2132 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2524 uthom.exe 2672 meivs.exe -
Loads dropped DLL 2 IoCs
pid Process 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 2524 uthom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uthom.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2524 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 30 PID 3028 wrote to memory of 2524 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 30 PID 3028 wrote to memory of 2524 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 30 PID 3028 wrote to memory of 2524 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 30 PID 3028 wrote to memory of 2132 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 31 PID 3028 wrote to memory of 2132 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 31 PID 3028 wrote to memory of 2132 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 31 PID 3028 wrote to memory of 2132 3028 e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe 31 PID 2524 wrote to memory of 2672 2524 uthom.exe 34 PID 2524 wrote to memory of 2672 2524 uthom.exe 34 PID 2524 wrote to memory of 2672 2524 uthom.exe 34 PID 2524 wrote to memory of 2672 2524 uthom.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe"C:\Users\Admin\AppData\Local\Temp\e7b17b5ec48c22672364714a5c60964b6089c0f5dd133c9bb5b1794ae03ca0bbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\uthom.exe"C:\Users\Admin\AppData\Local\Temp\uthom.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\meivs.exe"C:\Users\Admin\AppData\Local\Temp\meivs.exe"3⤵
- Executes dropped EXE
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD585546bcf395aa6965faaf63bb3e704c2
SHA1aa7fd0fc10f45ecf0d00625b0879131ea0c8ee4e
SHA25677197d3a46bbfae4eac82ac7c15f3c74e1b44b8dbe7566ebad55c463478212ee
SHA51266d94c367709a5f1b7c967028f4ff8451bc0e3b87d981c1ae3a38f8e3832ea9639bec5f5116bcd15872ed0fd0aacf7b1ffbd6c2f5f4511ea68815850d62bad7e
-
Filesize
512B
MD5a096ba7c95dbe4159eb245a1a03b994a
SHA1ae03ee64b0a9aa4e99b612621fc1f55abe3e35c9
SHA25686a92f1e62da8bd52510c5609e5c78dbc06f9669e4b773d52a595fdafe574777
SHA51278202cc37eb1261a784002399463a50512b423310f5ac355cc6606b6dd152d6716c3eb15f98ae75f7db3bd584f4448c99ca521723e30f4fccc38e7901655f11d
-
Filesize
231KB
MD5737b7579e9c348f7f4d66aa038c73e86
SHA1072fb376f74df1ab995f79482f13bd2cbb2e4b91
SHA256172f506f09cd1470f263ab3c94df050ae8f37b87ea7684dcec0da82daf7423c6
SHA512a9314779f3ca7b171910f3ba8d25301cf3e357adc079d022a328bdc668e52ff553fa1efdc74d679d7f0348f2a809a03aeca2222ecf52d79b888ebf61fbe2d9fa
-
Filesize
555KB
MD543e63fca7330bbc60b3d74f026f0ece7
SHA122a22b79efff35cea277e5e403983846dfaf2f07
SHA256268a710ba352b726bdb274141c8a28a4c44f301052033f20a62df07e9446691e
SHA512c55b8ff6aee8572714d29388e29c19414f88ac8db062e3435bf66ef9205f1180275353c3c4666c4efd5150570e90d8fd4e90d67383a3e81a51768d72dfea30fc