Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe
Resource
win7-20240903-en
General
-
Target
8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe
-
Size
323KB
-
MD5
54aac8667bedfee7994df8c337a7b170
-
SHA1
bc0dd454c453f0bb03ff14e1c05ace0270905cf6
-
SHA256
8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833e
-
SHA512
2e32e72186d173f2a5199869f71d1b0aa944a4801ca4bb46d4ed91c340339ff727b607d65c757d1e98e76c14269bbeaab68b0ce7c90084afb4012e85cfa6c114
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYF:vHW138/iXWlK885rKlGSekcj66cik
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Deletes itself 1 IoCs
pid Process 2408 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2324 rivyj.exe 1932 wyiga.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 2324 rivyj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rivyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyiga.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe 1932 wyiga.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2324 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 31 PID 1716 wrote to memory of 2324 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 31 PID 1716 wrote to memory of 2324 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 31 PID 1716 wrote to memory of 2324 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 31 PID 1716 wrote to memory of 2408 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 32 PID 1716 wrote to memory of 2408 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 32 PID 1716 wrote to memory of 2408 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 32 PID 1716 wrote to memory of 2408 1716 8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe 32 PID 2324 wrote to memory of 1932 2324 rivyj.exe 35 PID 2324 wrote to memory of 1932 2324 rivyj.exe 35 PID 2324 wrote to memory of 1932 2324 rivyj.exe 35 PID 2324 wrote to memory of 1932 2324 rivyj.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe"C:\Users\Admin\AppData\Local\Temp\8b2604bdccd1e9b55fa7ec43737b4d2d50db023654db9562a2550eceb9f8833eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\rivyj.exe"C:\Users\Admin\AppData\Local\Temp\rivyj.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\wyiga.exe"C:\Users\Admin\AppData\Local\Temp\wyiga.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5e5a710945ccb435648dade351fc5f34d
SHA1eb6b10ebc6f02f31f59c8bc5cb9a56baf2f7270f
SHA2565348a01acd30fd07eea86973b6e178bd0fc94c00fddbb6c5af894273a9f1e7fe
SHA512268d496deac975daf09e8ef0626b3030639622f08299c6aa7f3119cc4d1b780e00df87b551638281a36e4782ec72c7ecb492fff6253e6cb78641c3086815e69a
-
Filesize
512B
MD5c5b449e0527f62e64716c869ee3864e2
SHA199abd5526827102d907c3743aa51b52864022a60
SHA2560019f15da01a1def68ef40c03610e7b702e39afc8187b533b5c25593b6b6ff4c
SHA512efbc193e671ea5961a0fbd70350f91b8b631e834c58c5099bc1ba5d246857dab9f42e39c5759e3b12803412bbf63eb3eb8f208178b59d0edd043302464beb9a9
-
Filesize
324KB
MD5b2d4c61bd34f152112c67e4f315d1294
SHA14b3e3d88ccbd43008ed175f4f30cbc0bc3c0e484
SHA2568e00e891200cb7aada1537703d2b07dd69c2eb43b4794b70049a3284cb49ce5f
SHA5126f1ecde5e7788a47b21d899c267bcc090e43e2d4058895a69236ad8244dd1f58bd4fdd3b13631b395ec91248bf6cd11cbd46eb4097b441823e1180b0c33da0b3
-
Filesize
172KB
MD5d1102f155a6db7c28bafef8b970bcb19
SHA16b69f82a5492c7ec06c83cf96e44ca204e195c0c
SHA256a542980240ed23f9b548ce3f9872e7a7e0a2d08602e9bf1fd774378ce18e2593
SHA512410520deb8365d59aa5a6e52f24597c29a50f8c22e97b9490391068b801dd2f9f0f4332396f798d87b0474d6aae614a85580952574ae160ee94dd3f52463aa10