Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2024, 10:10
Behavioral task
behavioral1
Sample
605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe
Resource
win7-20240903-en
General
-
Target
605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe
-
Size
592KB
-
MD5
e4a8a7b2157919d1514b7326d9fbfe80
-
SHA1
957b115b1c3d866d3bf1c8c9c6fa9dfec955b7f9
-
SHA256
605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97
-
SHA512
b9e1579c06eaa8c65f6feecb82a28ec35121c6e9cdf436b87d9120fb9c2c18bfbcbe305860a8f044c2ba225d8f969ca0cc94179554ef7a06f504235ad11b33e3
-
SSDEEP
6144:CZKHKSIl0SatLPTUrjBpAs/mpYIqaaUN44Iq766ztAkOHn0LHZRi:C4jm0Sat7Az/gZvTIq2WKkw0Fg
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation joybv.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe -
Executes dropped EXE 2 IoCs
pid Process 2196 joybv.exe 4064 tuizm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joybv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuizm.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe 4064 tuizm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3672 wrote to memory of 2196 3672 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe 83 PID 3672 wrote to memory of 2196 3672 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe 83 PID 3672 wrote to memory of 2196 3672 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe 83 PID 3672 wrote to memory of 956 3672 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe 84 PID 3672 wrote to memory of 956 3672 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe 84 PID 3672 wrote to memory of 956 3672 605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe 84 PID 2196 wrote to memory of 4064 2196 joybv.exe 103 PID 2196 wrote to memory of 4064 2196 joybv.exe 103 PID 2196 wrote to memory of 4064 2196 joybv.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe"C:\Users\Admin\AppData\Local\Temp\605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\joybv.exe"C:\Users\Admin\AppData\Local\Temp\joybv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\tuizm.exe"C:\Users\Admin\AppData\Local\Temp\tuizm.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5a046b1422439be8068ba7db83ecc117b
SHA1a463dac4c35cee2f4f115bf4777cb423717fed8f
SHA2560f24eac36c8b282247dd3c75975bf0b2c1d90a5d9b7e1fb1e079d01b80fa4e0c
SHA5129f696134a6136abae67e971dfe691de21e003c187806fcc285d70adbb4b98ccd393482c78c739386220a68421bbc214fe88878d862078f925d2e8ec66a009f74
-
Filesize
512B
MD5f655f8cf0334ce2f1431d45b1621c7c0
SHA1226504783867ff64ae98ca3541dabb3778ff83eb
SHA25648b61146fb0766e2994044a72e3bb548d9f18f0e5772fb7fb1339d6db609857a
SHA512ad3d2060ccedea303a36fb08a220e1abf2fec1345502556a3cc6b57cc00337089c0e1805a541414262ca09f25c03a906bdb7efc9c92b37a3c0dd049c097bf808
-
Filesize
593KB
MD5ccf30887e7cf3f0571d02a881d858962
SHA1348341db835bc934a7c3c72ea065042a5d7d08d9
SHA25674c8aa63c04118457b24c4d67d3ef6cf23e9f432c8526b5164d16b1a41dda3ba
SHA5127a00d427496a8c56d376c5f4be808454dbf4d4cb9aded960328302b3680b51ec19cef39240e85540106a0283d1753185769734a4c08e700d450af9a594f686c3
-
Filesize
323KB
MD59041e77d58118f0fb77f6eb6c99ba723
SHA1e4bd48a5a18b24f77ff1c95ece893ddc55a1423e
SHA256f34094421b677b4f8d05025dc95addeae981798df5dd0df4b22ee185285d30ae
SHA5127dd6142f1648b565f9a0d7f4d479b09b981bdada11ab686e12cdec0bd51ea1b7d51d5b80e69a3ec5b54a94f62f89b9fbb4407c94bc7331401dda622d38128da8