Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe
Resource
win7-20240903-en
General
-
Target
163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe
-
Size
334KB
-
MD5
092601aa9bd005c40f2ade0e114203d0
-
SHA1
c140bdacfd57ee5ba2dbf7ad65f087dbcb04e193
-
SHA256
163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34
-
SHA512
eddf969e06cf00bf81c116768830724c069f010d3a37293d6a41316fb815282d45e0690c6513102e7943b96a1637d9acff2cff6a3e691219ce5d9866dafb0957
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYm:vHW138/iXWlK885rKlGSekcj66ciT
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 1680 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 ihibf.exe 1180 jytux.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 2532 ihibf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ihibf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jytux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe 1180 jytux.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2532 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 30 PID 2536 wrote to memory of 2532 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 30 PID 2536 wrote to memory of 2532 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 30 PID 2536 wrote to memory of 2532 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 30 PID 2536 wrote to memory of 1680 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 31 PID 2536 wrote to memory of 1680 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 31 PID 2536 wrote to memory of 1680 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 31 PID 2536 wrote to memory of 1680 2536 163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe 31 PID 2532 wrote to memory of 1180 2532 ihibf.exe 34 PID 2532 wrote to memory of 1180 2532 ihibf.exe 34 PID 2532 wrote to memory of 1180 2532 ihibf.exe 34 PID 2532 wrote to memory of 1180 2532 ihibf.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe"C:\Users\Admin\AppData\Local\Temp\163b93332e85582c5953c7799db7127e9a0664a46853e18fff365f8f32090d34N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\ihibf.exe"C:\Users\Admin\AppData\Local\Temp\ihibf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\jytux.exe"C:\Users\Admin\AppData\Local\Temp\jytux.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5b9a5945f422d9717cadb3a3c8003d139
SHA1cc64f47a415741c4ea485ae64152b877dddf9849
SHA2562e04ed1467c2166241c9ee3fea2d4fbda2752b9f284370ef348fbb26ff881b3a
SHA512e56ad9e234a77bb37df11c6e149065e54e6642eb54a662be97dda4f38a16fa9fe80636550f330040b32223902f8b8aa5c81ae3ee9688c7a7ba6669ba91e47c1c
-
Filesize
512B
MD58a7cc843486b65f43aff838b1d0cd416
SHA11c45e14f7743da816b34691f3273d1fe265d1bb4
SHA25670ea4ab4bbb1a932ef81fbdf3b7ee2f477030d3469da17b907d7a9bcd51df72b
SHA512b342e084137aeef186204f813b9a5178335242d23247b4a8989870200dc6d84d3b14a5c5909c92e03245c65710eb403ac87110a59a0727d39df13332c0e3b5f2
-
Filesize
172KB
MD5f78a0ed5b480a623094dfac97df1e0af
SHA1683a17e2e61c8f662f16287b5e5cd866755cfde6
SHA2563e737fba9b300d88d4d9ea796dc4cdb66f1c33849afad037a8eac12380fd27ae
SHA5126deb7a00d19203684fe600a06642253e10feb48ade43554e84f4812987a12e63ceeb548d5b1af4f06e3a471d92a1cbc1ecc82224beb61d2a500c6d1e0db82fba
-
Filesize
334KB
MD55c9716cf19a4ccf9d482ef064c172a33
SHA10cde2662663b6e280d93e54085a3d31ee6262ea3
SHA2563333824c706d4e591f81a626f42f563140f7f2b02dcee1e3fc20ef16e9fe1a8a
SHA512582dd89556f20d7d72fbf6b11ec63406b0e13b2e142d7d06aca7b6d1799f3c6db11ca8b964830b1b86dcb478537d7ca02a2f6bd39a1076498c83a71122cdfdfc