Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe
Resource
win7-20240903-en
General
-
Target
4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe
-
Size
341KB
-
MD5
ef13ce416ef6241e97b9204da5a97f80
-
SHA1
a5a5dc9810661beacbcf7c89f170ba23d13b5ca4
-
SHA256
4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535
-
SHA512
1295ce2980a0bc9f98699e76f82621461c0c0683f7a5b46300525fc5f9960d02d2299d5ebdd278cfefb7f3f697423e48284c4507b4047dbafb2c10bd127bef84
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYRcECHUI:vHW138/iXWlK885rKlGSekcj66ciaC0I
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2728 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2860 neevl.exe 1632 qoijh.exe -
Loads dropped DLL 2 IoCs
pid Process 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 2860 neevl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoijh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neevl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe 1632 qoijh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2860 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 30 PID 2700 wrote to memory of 2860 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 30 PID 2700 wrote to memory of 2860 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 30 PID 2700 wrote to memory of 2860 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 30 PID 2700 wrote to memory of 2728 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 31 PID 2700 wrote to memory of 2728 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 31 PID 2700 wrote to memory of 2728 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 31 PID 2700 wrote to memory of 2728 2700 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 31 PID 2860 wrote to memory of 1632 2860 neevl.exe 34 PID 2860 wrote to memory of 1632 2860 neevl.exe 34 PID 2860 wrote to memory of 1632 2860 neevl.exe 34 PID 2860 wrote to memory of 1632 2860 neevl.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe"C:\Users\Admin\AppData\Local\Temp\4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\neevl.exe"C:\Users\Admin\AppData\Local\Temp\neevl.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\qoijh.exe"C:\Users\Admin\AppData\Local\Temp\qoijh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5f8547e48c36c345bb295f32db5698194
SHA1df3724495be98d6dabbfd22941219b2c780b5eb5
SHA256d3a2a3660f7adceef90ff20a118ff792f53d1c61e56e7c30190681a8820271b6
SHA51281d519d024247b549710791f0aa12e5079a06722e90118ccb7cbdbff5b6d66680066495e22dc74e56009d8e9db50fa73889b50aeb577392bd34f646ba523b586
-
Filesize
512B
MD514c7bee0c0da04077d4f3a1a58cb6a3a
SHA10020646f7248a52175f3d8ec1b7ba1f5449bbdb7
SHA25609db9806699036917d78078801c248bf249305c74c7152ceaa44f042c1234345
SHA512ff9080b96e674c415c0af97cc1007741f6d7c5cb8e40e112e36b619f56dca83147d0ce207e3768b7385050fdc7f0e78df226f31520d05edd2a8ce954803535f9
-
Filesize
341KB
MD5b77b846673c4ec8e9bd95f35018a8f2a
SHA1df24469eadf46e96c9c6d5f1f7a541f6734b4545
SHA256d06841cb318cb56f908c620280d4ed6829625611d42e1d4d5a0753485483ef84
SHA5127f8f8b3d7970778ae9fd5e3d3cc6784a308202d7f29a4f097e98131e4537f9b34bda2a3921667d07718f27fc206f0f0065bd5d1270a4b6dec704bf609fa6ddca
-
Filesize
172KB
MD54d8886252d1420fe1325e02290cb8362
SHA1538591d408ca6b910ddb343caff11748b5550da7
SHA25610dc9247f4875f68331948b413309a93cc49976ec1ee4104134c43371134b751
SHA512b04d4e3e868d63e734fd5fc701f682611c56ab1ec3226662e906cfe7fd99a4f202d928cf14456bdd9c5ef7b224edfb93695f218d17c6414f7387d3c73b0e9265