Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 02:23

General

  • Target

    4816f302177143676a2c415259b2b1ca889adf99a97b97a0b6ff18f1e221ffe9N.exe

  • Size

    330KB

  • MD5

    463f5610b951b6cca819ec598c1e5e90

  • SHA1

    be4d199ce6592614e3964f6ba37da23a81281621

  • SHA256

    4816f302177143676a2c415259b2b1ca889adf99a97b97a0b6ff18f1e221ffe9

  • SHA512

    c341b274a03dfe726eead3aef688a47742c93985e0768562fac61e3d980ea8b951c5c694a348a67c7daba2a7400cbc68e33d30f7c3594299b1287f70bf568367

  • SSDEEP

    6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XY6:vHW138/iXWlK885rKlGSekcj66cib

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

218.54.31.166

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4816f302177143676a2c415259b2b1ca889adf99a97b97a0b6ff18f1e221ffe9N.exe
    "C:\Users\Admin\AppData\Local\Temp\4816f302177143676a2c415259b2b1ca889adf99a97b97a0b6ff18f1e221ffe9N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\zoecd.exe
      "C:\Users\Admin\AppData\Local\Temp\zoecd.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\ritar.exe
        "C:\Users\Admin\AppData\Local\Temp\ritar.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3068
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    342B

    MD5

    2d458e2e5fb0ca55c3e6c41da5e1a8f8

    SHA1

    2395fbb7aa04f79d7f7f69c32a637decce91cbc4

    SHA256

    981328514ce143f6f56d351b41051cd0b14cf57c8852be0ea0fd2f605b3d874e

    SHA512

    14563dc629e39aaa19816958301c1c933afe99efefab82ac71b9d7dd4ab699e638d7646e6c9b81df1ead64fc9a89633c4d94e5be07c25884f3bf092594052086

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    367b01963d39521db768a046f9958799

    SHA1

    b6239209d21089564d0edc96d16a86ec02bf923b

    SHA256

    5b021f8e0888e0b57f69ec27a468739d2974860e83d0cfe618c0c8401430bb9a

    SHA512

    1982b27e9536196e80ebd7cf2312ca9584feff678a02bdd00086a8bb53fa7e7fb90e4f2f4281bdb6116a5766b93b33d3629a6272e8c4a698e4aa86c48657ea8e

  • \Users\Admin\AppData\Local\Temp\ritar.exe

    Filesize

    172KB

    MD5

    422023f962b4e9bbeac5cfe6c53da7ae

    SHA1

    b03c5d516d006b1224650d276eced1db488c5e5c

    SHA256

    c68998c27dd79be0a6e2ac8df3667287ef99833cbf6555da1046143e1a520a76

    SHA512

    829800110d0d06a015ea16f126b77ee31209b7f8cf49e3c71082cecf8d6db7115405e5464274e58d88d3b64aeed13bd4466f6c6444038922221108d03cf6562d

  • \Users\Admin\AppData\Local\Temp\zoecd.exe

    Filesize

    331KB

    MD5

    fb8ef248586f4c23ab2514ebe44d6cab

    SHA1

    d8f6679af65c26e8f68b3b6d98d04a9249fc4a4a

    SHA256

    8e5cc0f52a734cdd8cf7a87ef2a7d51187f00876951515621f390ed08fa8d3a5

    SHA512

    a671314695ab104f8166fa2c65e6fc7a43dd9b1ed2fef084167652cbb027137bd5d19968bf69fb5e7f0936a070152c650aaaad2e455bf06db8debe41205d0fbc

  • memory/2304-24-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2304-41-0x0000000001030000-0x00000000010B1000-memory.dmp

    Filesize

    516KB

  • memory/2304-25-0x0000000001030000-0x00000000010B1000-memory.dmp

    Filesize

    516KB

  • memory/2304-21-0x0000000001030000-0x00000000010B1000-memory.dmp

    Filesize

    516KB

  • memory/2304-20-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/3032-15-0x0000000002490000-0x0000000002511000-memory.dmp

    Filesize

    516KB

  • memory/3032-19-0x0000000000120000-0x00000000001A1000-memory.dmp

    Filesize

    516KB

  • memory/3032-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/3032-0-0x0000000000120000-0x00000000001A1000-memory.dmp

    Filesize

    516KB

  • memory/3068-43-0x0000000000E90000-0x0000000000F29000-memory.dmp

    Filesize

    612KB

  • memory/3068-42-0x0000000000E90000-0x0000000000F29000-memory.dmp

    Filesize

    612KB

  • memory/3068-47-0x0000000000E90000-0x0000000000F29000-memory.dmp

    Filesize

    612KB

  • memory/3068-48-0x0000000000E90000-0x0000000000F29000-memory.dmp

    Filesize

    612KB