Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2024, 10:10

General

  • Target

    605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe

  • Size

    592KB

  • MD5

    e4a8a7b2157919d1514b7326d9fbfe80

  • SHA1

    957b115b1c3d866d3bf1c8c9c6fa9dfec955b7f9

  • SHA256

    605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97

  • SHA512

    b9e1579c06eaa8c65f6feecb82a28ec35121c6e9cdf436b87d9120fb9c2c18bfbcbe305860a8f044c2ba225d8f969ca0cc94179554ef7a06f504235ad11b33e3

  • SSDEEP

    6144:CZKHKSIl0SatLPTUrjBpAs/mpYIqaaUN44Iq766ztAkOHn0LHZRi:C4jm0Sat7Az/gZvTIq2WKkw0Fg

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe
    "C:\Users\Admin\AppData\Local\Temp\605a69e8e29d36e72a7aa2bc021f9140762c166d2a254fb9a6d5346e38ec7b97N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Users\Admin\AppData\Local\Temp\joybv.exe
      "C:\Users\Admin\AppData\Local\Temp\joybv.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\tuizm.exe
        "C:\Users\Admin\AppData\Local\Temp\tuizm.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4064
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    342B

    MD5

    a046b1422439be8068ba7db83ecc117b

    SHA1

    a463dac4c35cee2f4f115bf4777cb423717fed8f

    SHA256

    0f24eac36c8b282247dd3c75975bf0b2c1d90a5d9b7e1fb1e079d01b80fa4e0c

    SHA512

    9f696134a6136abae67e971dfe691de21e003c187806fcc285d70adbb4b98ccd393482c78c739386220a68421bbc214fe88878d862078f925d2e8ec66a009f74

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    f655f8cf0334ce2f1431d45b1621c7c0

    SHA1

    226504783867ff64ae98ca3541dabb3778ff83eb

    SHA256

    48b61146fb0766e2994044a72e3bb548d9f18f0e5772fb7fb1339d6db609857a

    SHA512

    ad3d2060ccedea303a36fb08a220e1abf2fec1345502556a3cc6b57cc00337089c0e1805a541414262ca09f25c03a906bdb7efc9c92b37a3c0dd049c097bf808

  • C:\Users\Admin\AppData\Local\Temp\joybv.exe

    Filesize

    593KB

    MD5

    ccf30887e7cf3f0571d02a881d858962

    SHA1

    348341db835bc934a7c3c72ea065042a5d7d08d9

    SHA256

    74c8aa63c04118457b24c4d67d3ef6cf23e9f432c8526b5164d16b1a41dda3ba

    SHA512

    7a00d427496a8c56d376c5f4be808454dbf4d4cb9aded960328302b3680b51ec19cef39240e85540106a0283d1753185769734a4c08e700d450af9a594f686c3

  • C:\Users\Admin\AppData\Local\Temp\tuizm.exe

    Filesize

    323KB

    MD5

    9041e77d58118f0fb77f6eb6c99ba723

    SHA1

    e4bd48a5a18b24f77ff1c95ece893ddc55a1423e

    SHA256

    f34094421b677b4f8d05025dc95addeae981798df5dd0df4b22ee185285d30ae

    SHA512

    7dd6142f1648b565f9a0d7f4d479b09b981bdada11ab686e12cdec0bd51ea1b7d51d5b80e69a3ec5b54a94f62f89b9fbb4407c94bc7331401dda622d38128da8

  • memory/2196-11-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3672-0-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4064-25-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/4064-24-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB

  • memory/4064-28-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/4064-27-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB

  • memory/4064-29-0x0000000000400000-0x0000000000497000-memory.dmp

    Filesize

    604KB