Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe
Resource
win7-20240903-en
General
-
Target
2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe
-
Size
335KB
-
MD5
7f1a038abd5a1f7b5450ac958c2f6228
-
SHA1
f1efd2e7674dcf608e4be0b48a9f5febde25c832
-
SHA256
2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55
-
SHA512
28ab0bb3dc5e83b77f93a94d4830a7bdcde1c2e8c40d602edec96a4b7bb066dd7135f3c2cbfea1fae03d756ced6850b118af8a02ae4a52ef18663b185b5a0026
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYvRu:vHW138/iXWlK885rKlGSekcj66ci2Y
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2172 siliq.exe 1708 biwuv.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 2172 siliq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language siliq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biwuv.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe 1708 biwuv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2172 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 30 PID 2368 wrote to memory of 2172 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 30 PID 2368 wrote to memory of 2172 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 30 PID 2368 wrote to memory of 2172 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 30 PID 2368 wrote to memory of 3052 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 31 PID 2368 wrote to memory of 3052 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 31 PID 2368 wrote to memory of 3052 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 31 PID 2368 wrote to memory of 3052 2368 2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe 31 PID 2172 wrote to memory of 1708 2172 siliq.exe 34 PID 2172 wrote to memory of 1708 2172 siliq.exe 34 PID 2172 wrote to memory of 1708 2172 siliq.exe 34 PID 2172 wrote to memory of 1708 2172 siliq.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe"C:\Users\Admin\AppData\Local\Temp\2726d4348e1cb9589171be272a5801b86f2bcf97489c70e66384e08822db2c55.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\siliq.exe"C:\Users\Admin\AppData\Local\Temp\siliq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\biwuv.exe"C:\Users\Admin\AppData\Local\Temp\biwuv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD521ac784e23b6126b7080b1e757b9d322
SHA15164a67da448d36fa22ff1c014b5282745d7d12f
SHA25605a4d2a1c76cc1c0d601559ac7b164bdee1a74d926be50c07a3202f5d257399b
SHA512c86cbcec89d5121bf964f0115f7b1ee47ca0546b451007505294ab9cadd632183e5d936684cb8be9b2225ed07d7f210faba15bb87fa2eadfb67a8d8a95c7e1da
-
Filesize
172KB
MD512a90fc253b39d24ca88727a94778f33
SHA1a8b93fad1ae604168893cb6130d5f1d839582835
SHA256bbccdd25b7a2785bcf0930b09319652847dad766f19c752b0a8723bb47c2dea6
SHA5122148f3e3ad542abe0fbe3affcbe4a4afc56bb1de17b64edae5d3ca9e09b3536d7927d285b9021812c3a863f187be58de882c919ebbf6da380f13e24d9e8a6679
-
Filesize
512B
MD58dce4e89ea5997e968f56cd50b00d023
SHA1df8cfe3d160d76145bdcdd7e00f91bdc4379f44c
SHA2566cabba8945ba1b12c330f2fc737f2e035c7de2e6dba4bf838d091666bf85f465
SHA512ad8e278fb45973028b0bf7cc99e3f46e377127d39e08e6ed904b218ec53a1a26415fcdf06b4ad9929a655d22eb7900e3fe14ac44afd25a508f89d5d873ba5611
-
Filesize
335KB
MD5a704f508b9770395630dd872f35e0739
SHA12d97c116c1c9e90da50f9336636de1ff1197490d
SHA256294281c8e3f3f48b6e7902e3cf441234516803cf51ba7f82e31f6f8f51469fd7
SHA5128cfb86701aa779a005255471bf415be3d877cb6b0168079e6d67e3df3ea9e70fc74cec278877d3a169d28099fe27a9f9e22207e5069d732f95650e24daa52f7f