Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 23:41
Behavioral task
behavioral1
Sample
3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe
Resource
win7-20240903-en
General
-
Target
3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe
-
Size
505KB
-
MD5
6568e820aef4d499b2f11377d870f4f0
-
SHA1
2d7a5cad37d6ed0379ec87b50b85046abbeae1c9
-
SHA256
3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7
-
SHA512
3dc6f3122779c75eb2676402283bfd6cb00072cf994dc7487b531d483da12e603a20b094548cb32153b9ef4ebeaf4a23e1031aa5d260021d631b10069221210d
-
SSDEEP
12288:N/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFo:N/D0caF8wvhb43pDbo
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wuziv.exe -
Executes dropped EXE 2 IoCs
pid Process 1856 wuziv.exe 904 uwecl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuziv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwecl.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe 904 uwecl.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4184 wrote to memory of 1856 4184 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe 82 PID 4184 wrote to memory of 1856 4184 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe 82 PID 4184 wrote to memory of 1856 4184 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe 82 PID 4184 wrote to memory of 1152 4184 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe 83 PID 4184 wrote to memory of 1152 4184 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe 83 PID 4184 wrote to memory of 1152 4184 3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe 83 PID 1856 wrote to memory of 904 1856 wuziv.exe 87 PID 1856 wrote to memory of 904 1856 wuziv.exe 87 PID 1856 wrote to memory of 904 1856 wuziv.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe"C:\Users\Admin\AppData\Local\Temp\3a5c7544f105f43cd94227ba4844167c42538e4ac4f5944ef4528f0521b3cce7N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\wuziv.exe"C:\Users\Admin\AppData\Local\Temp\wuziv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\uwecl.exe"C:\Users\Admin\AppData\Local\Temp\uwecl.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5351e5035882ef3fb0980c333d9438712
SHA17ac142096eeb461f8b1daa080d1412ddd2003ae3
SHA256302ff071987d3fa0420ddb9dc5844949feb835d36646a9649fa60947ae5b7874
SHA5122a7760e88a0bdbfe0dcadc2ca67eeb1b2321b524b617029fa923636237bdd10eac0e0961448586901eb4bf66f843476a81ab9b44b4cbe05a29c881c0d6cd3922
-
Filesize
512B
MD5ec410ea71c5a28d70b064b19564c4639
SHA1dcb0730069bcaf9b0ce4ff189e0c0535f6823e24
SHA2560cdfcde9bd43194dcdc00b8e091c70bb940cefb4926d8c7213c44d581f8dc205
SHA512026f150e64c7f7fa93a1c3e40dce31819e6b3fe097d79628dffb6cbe6710e033c950f0f1df95335eb5adfa65a711cdf4c7f45043099a0a99100b8792cb00aa94
-
Filesize
218KB
MD5902ecfc15ec6003a768892b25c4a576b
SHA1f33f49c4bf41104fa62102f1dbe70e7c231f047d
SHA256f6a4b57d6c624061a3a0cab8a86e64c0fbfd92b77584b368e60dc46c2b992263
SHA512be78091a21f46df941fc90789b1f5a76cc7a720e3e0ab669fe1f848988d33e06326fc1078c991e527884dacd83bca64d5e0f0fb7d8544b6865b470feee34dedf
-
Filesize
505KB
MD5da7fc76f893390fd2ee7fa5926db4902
SHA165640cc328a9363cdf48a5892e427125fb9e211f
SHA25690c75d157615dacb7393a741a0370cdc4a57bf433776c8418903ecf913abeeba
SHA51274ebe0ea31a3e4cf8b2a7bb323cc4d021fbea9be505683b67396080850af40f75e81e6e6fbe790570a37c91f0e2cea0e4905a5b8632e30a1a3c7c21cc18eb618