Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2025, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe
Resource
win7-20240903-en
General
-
Target
962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe
-
Size
94KB
-
MD5
ac33f7fadbdc4830ac9aa3572e69cfbe
-
SHA1
4e024b5771443c3636d26d72fc2cbec12c2c9aac
-
SHA256
962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58
-
SHA512
a521074c5bdd8e2302f3fc8019e4fc8a27f208fe6e9148961855f1d30dd27a6fc52dcf8d835e5684b4a9cea2c6ce20a46bda2229a8dcb987566b99e7f28275d9
-
SSDEEP
768:tp0ti4HnnhtwYbJy6rioyelmd1TzulQEDDPOwc5n5uNCT/jhhLBxQIwqepJZU9mk:tWzhtJbUgHoADDIx1hLfuJrk
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe -
Executes dropped EXE 1 IoCs
pid Process 4100 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2764 wrote to memory of 4100 2764 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe 83 PID 2764 wrote to memory of 4100 2764 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe 83 PID 2764 wrote to memory of 4100 2764 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe 83 PID 2764 wrote to memory of 4188 2764 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe 84 PID 2764 wrote to memory of 4188 2764 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe 84 PID 2764 wrote to memory of 4188 2764 962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe"C:\Users\Admin\AppData\Local\Temp\962f0b089380f0c2f49d7ebfbb2ac857766698c0fca0d4bd9919572dc9b51c58.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD516c2bcf1dae729c5cb36a1875efe354c
SHA1775fbf4b6a2e5bc033b86cfc0893250b5d387a45
SHA256796a881d71234f7fcd9f5220c6e5674e231610bbf37626d9e5b79dc3268b7bb4
SHA512d8bd6cb6cb6ccd3c2cc40edde9cd3e8c09d1ae55c21ac1896325c324c08507e68c16d3864923806d29db79c57b958dac68e43bdcf809c0a2c8b5b0a7b8557177
-
Filesize
94KB
MD53a6d014c602ffacb08f6fd9a051fd641
SHA15a2e524dec4a04ea56f08990a658496c62770b77
SHA2569450c09d24dae875b8416455a1c91ca4509fbc8d3de221683be82c6462d57b13
SHA512cd27afadce60c0bed0f128e3a8a5ce822f7247d6391261fc9dfc12ef5eeb5d80393f3d457f2c5ec6e118b1f7b29acf254f90ef03a0192001f26ce4ed16b15fd7
-
Filesize
338B
MD5a6b98b6a2dcdd0d3f2c03a1ae898bb55
SHA122882879860888141298817888fbabb56fe7bc92
SHA25662e094d7cc46f096c681af535bbc8d73e669cc95fcfe4a79800a152891fe8d6f
SHA51298c58dfcd1e5e0fea28719aa350355fdaec56e24d1da5560783c7b1a604b375f7ae945255671ed64bfff4fe903261e731923be09e3e3c70b71cbe63430fc329a