Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe
Resource
win7-20240903-en
General
-
Target
4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe
-
Size
341KB
-
MD5
ef13ce416ef6241e97b9204da5a97f80
-
SHA1
a5a5dc9810661beacbcf7c89f170ba23d13b5ca4
-
SHA256
4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535
-
SHA512
1295ce2980a0bc9f98699e76f82621461c0c0683f7a5b46300525fc5f9960d02d2299d5ebdd278cfefb7f3f697423e48284c4507b4047dbafb2c10bd127bef84
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYRcECHUI:vHW138/iXWlK885rKlGSekcj66ciaC0I
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe -
Executes dropped EXE 1 IoCs
pid Process 3920 yfmuf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfmuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3920 3932 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 83 PID 3932 wrote to memory of 3920 3932 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 83 PID 3932 wrote to memory of 3920 3932 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 83 PID 3932 wrote to memory of 3288 3932 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 84 PID 3932 wrote to memory of 3288 3932 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 84 PID 3932 wrote to memory of 3288 3932 4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe"C:\Users\Admin\AppData\Local\Temp\4aa4362ad4585e43505a8c156b04dba550977d3e106677e984e28d26c3304535N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\yfmuf.exe"C:\Users\Admin\AppData\Local\Temp\yfmuf.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\qopin.exe"C:\Users\Admin\AppData\Local\Temp\qopin.exe"3⤵PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5f8547e48c36c345bb295f32db5698194
SHA1df3724495be98d6dabbfd22941219b2c780b5eb5
SHA256d3a2a3660f7adceef90ff20a118ff792f53d1c61e56e7c30190681a8820271b6
SHA51281d519d024247b549710791f0aa12e5079a06722e90118ccb7cbdbff5b6d66680066495e22dc74e56009d8e9db50fa73889b50aeb577392bd34f646ba523b586
-
Filesize
512B
MD58131c393435f0b636da9e37271d44d60
SHA12238893b5dc466d0c6b3bececa41fa1bb8f8a8e3
SHA256fe8b8eb3279e774843af59b813fb0897988196ee6c523a006e67035ce434d083
SHA5124cca67377721d49668c915b87421536bf2c8c9e643aa427cd714c127cbfc0d5fb8ccc51c440b609710aaa2b0379772259fb79d0340cf4b0d7e254748c01324bb
-
Filesize
172KB
MD5c57cc4a2fbe07c6d0e65fc73e7920c48
SHA1f6039e5524a3ef7fa299f2c19a37433f5c3132ac
SHA256d730c1bccbbaa82ed6055fde5306db2d5a9687a79eb1e1c3638a79b597a185a7
SHA512a3ccb8624147710033b2e81c14e84c3fafb1236b194abc5448d16e7cd6144254f2b773d0fca613c9bbd24e9e2b166d774336ccab5c22d1dfd9069b2aaaf5c74c
-
Filesize
341KB
MD5b80f75ed344d1a7d91efbb53b6141a39
SHA17f1328ba6a1d1c61a88c5d0572dafd8ee2e97d12
SHA25660e8a3d52e7e7b2c07d5c8d4df11cba2aa8063f0e82cce1f06b2ac5dcb8b843a
SHA5123ad466ec4a1783974bb1debc4965e47a6c33307a6cfd00df503574bdbde46e88c7253be1bb661ed9a632230995b7ad7576b169bdde6295a3749a3ac913626954