Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 00:37

General

  • Target

    46b06d0169d9e4331fac4aa4bcc0af6b359f7c7cb287bf26af4744705eca7554N.exe

  • Size

    371KB

  • MD5

    daba502d270d8c7970e6413e70ad64f0

  • SHA1

    64c12ff1354120dff0c71955d7639167941cd06a

  • SHA256

    46b06d0169d9e4331fac4aa4bcc0af6b359f7c7cb287bf26af4744705eca7554

  • SHA512

    a33791bb0d18cda7b3591b5f2088ed2f7f1c6f72d28cbf7ac34a49d60b4363f8f5866297c0a30616f74c6ccb256f98d88a97f4178d7a2387d8a3ccaecd94f2cf

  • SSDEEP

    6144:CuJkl8DV12C28tLN2/FkCOfHVm0fMaHftvCGCBhDOHjTPmXHk62pl1:CzGL2C2aZ2/F1WHHUaveOHjT/

Score
10/10

Malware Config

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46b06d0169d9e4331fac4aa4bcc0af6b359f7c7cb287bf26af4744705eca7554N.exe
    "C:\Users\Admin\AppData\Local\Temp\46b06d0169d9e4331fac4aa4bcc0af6b359f7c7cb287bf26af4744705eca7554N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\giviu.exe
      "C:\Users\Admin\AppData\Local\Temp\giviu.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Users\Admin\AppData\Local\Temp\igdoc.exe
        "C:\Users\Admin\AppData\Local\Temp\igdoc.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2820
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    342B

    MD5

    fed8c560b73e9461d78fc6e623425571

    SHA1

    93569ed3aed6cd3c92d4ee8d8b799110f408298a

    SHA256

    42542ad4667a0e43dff5283567dad6e8a2995366ba7547c822e5734fcd782100

    SHA512

    8a1077eaf322748550ab7ce22431c00b011858bdac085de84b9843b4e2efad4517bffa249f1115acff7a51c0e76e43972e73c9335679d8e5bce04af695b06310

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    b80b9cab2ee251bc89460bc3180133a1

    SHA1

    822b8ca35650bba62449e3d2f88e302abdc0183b

    SHA256

    600c6ac49464a6d1f6dc5852d8b9b2f78d1a06d39d0c21d510c3f97779c67e5a

    SHA512

    f748a6df1980e1d7d787d92ce1e54925a4f770b55b8e94ba0dd3b70ed49e4a04bc02046bcd9459beb4101e63589a95d8dd46f8ed193b6779b2e042f30f27bc24

  • \Users\Admin\AppData\Local\Temp\giviu.exe

    Filesize

    371KB

    MD5

    1223ff2544de52398a3594b9030521b3

    SHA1

    3197a56f107c8c756389b09075c8e2bf0ef4b8b4

    SHA256

    b9f319607d80aa583f3910f8ccaf0b3b3383b24c04b6ed33a3244ea58b196a8d

    SHA512

    f8a4e1fb2061c092a09055bb56a857a189b6fd52b7ae1ff00d772f41b1bc194405791a2d7f7e1efa494ffbc8226e9a83c3de05665b6ed19fd99065f10e19792a

  • \Users\Admin\AppData\Local\Temp\igdoc.exe

    Filesize

    303KB

    MD5

    d5698d17994201c8a1fa206555f7e56b

    SHA1

    3a67945ba5edc3c4b503d6cce027c2d48f92fa12

    SHA256

    48c62e86bb798056644dc8b682cf758154b48ac2cd38360d9d5cdd2b806758e8

    SHA512

    bf1b4978e3327f3ed32f114c585f59e46e74119e0f441074fd6219bc6b048a5b42e4c3f35b5a78fa06de2db7f54b2a2e9c111a100393d85211e0e14baae9d161