Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe
Resource
win7-20240903-en
General
-
Target
4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe
-
Size
335KB
-
MD5
6b6d7280b40ecf8da84985d92247e200
-
SHA1
1ef07cafa873cdb3e748558ea6a92ff890757612
-
SHA256
4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4
-
SHA512
736c7e889bd4a8d957a25c6491532c8420edf0ff6f1f28e573cac3aa17cf11999caa793648d03e4c071f6a8fc63676067f5c67da89ce4604c1e9fc14ea43a3b9
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYVV0:vHW138/iXWlK885rKlGSekcj66ciEV0
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2844 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2316 xofub.exe 1996 dipoa.exe -
Loads dropped DLL 2 IoCs
pid Process 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 2316 xofub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xofub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dipoa.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe 1996 dipoa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2316 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 31 PID 2616 wrote to memory of 2316 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 31 PID 2616 wrote to memory of 2316 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 31 PID 2616 wrote to memory of 2316 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 31 PID 2616 wrote to memory of 2844 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 32 PID 2616 wrote to memory of 2844 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 32 PID 2616 wrote to memory of 2844 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 32 PID 2616 wrote to memory of 2844 2616 4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe 32 PID 2316 wrote to memory of 1996 2316 xofub.exe 35 PID 2316 wrote to memory of 1996 2316 xofub.exe 35 PID 2316 wrote to memory of 1996 2316 xofub.exe 35 PID 2316 wrote to memory of 1996 2316 xofub.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe"C:\Users\Admin\AppData\Local\Temp\4befb8512f82418b0e0aa461dc0f5492863888034f836fe0a63d3b89034915e4N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\xofub.exe"C:\Users\Admin\AppData\Local\Temp\xofub.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\dipoa.exe"C:\Users\Admin\AppData\Local\Temp\dipoa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD522222a2451e6d34a39b22f51cd34e504
SHA184c6c07bb4cea25b2dbe1c2e7d9cc7c67307e028
SHA2566d2db47ebe8a8e93fbd985a7111986ff83d9a7e900c738840f9d4955be2066c2
SHA512718ed487f7c7e54a3fccce5a523c11aeb4fb631b03f22bdc477a91a32238d936dd500df477562ab882e2cedee4c49a822a9593126178628c7d14d4b8c28c8478
-
Filesize
512B
MD552e24c2475f3cb1b125d1eb5a240e8e5
SHA160c3d7df1d32e2a7c75817e7ed97fdfe6306cf9c
SHA2569969198077999e0e7579f6f95d248634d656654a727259c405dd97102106217b
SHA512bcfc95dc3338aab23734fd74ab297fbecca824a44fb5d50b1f52d47969b857683365c4f462d434a54e59642e63bb5c37767c1d9745f42f712d9fabd373b53b4f
-
Filesize
335KB
MD5756bbff4ba07c2f46efb3fc57223fcc6
SHA1dff073b27fab0daff2749522aa74f273dd7e5c83
SHA256adbd1ede0020a29a8171eaa257d21b4f45f1defea088ed6d63d305ccc9f684c2
SHA512fb5f678e513c2b2d276fe48d8d550a26f5b86fe10d19f5c20c02a076e66d337c26571d3ae5928896db6ef48bbeb95276a8c7b083abaaf9c751813c3b1f9c04bf
-
Filesize
172KB
MD5d1102f155a6db7c28bafef8b970bcb19
SHA16b69f82a5492c7ec06c83cf96e44ca204e195c0c
SHA256a542980240ed23f9b548ce3f9872e7a7e0a2d08602e9bf1fd774378ce18e2593
SHA512410520deb8365d59aa5a6e52f24597c29a50f8c22e97b9490391068b801dd2f9f0f4332396f798d87b0474d6aae614a85580952574ae160ee94dd3f52463aa10
-
Filesize
335KB
MD5177ef0c4eb71072eb864e0b032970858
SHA154de48d76ddb734a1d53a296744ffbff07895919
SHA256ebf42eec797350c8b4e90a353f636b415f304454900b8f857f9232bccc2350b4
SHA5123cf645ea1ca7ed863befccf02d681ea6f76eb2353827d75a9e14ab6741614e79bb90c5ae167233ffd233267c23a7d85387e6b46e6bd41bef0dc9b34a6e474dd5