Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe
Resource
win7-20240729-en
General
-
Target
4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe
-
Size
335KB
-
MD5
8e592493f4396101c59cc31a5176b580
-
SHA1
a982d8305da273c5517f3cd35176c8146ee97bb4
-
SHA256
4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6
-
SHA512
8d7adf013194a3d1507d05956996a05f3e961816f6df800f5cf9e97499b9ee7393dd6d3d4544131eeff513cd1cc44a2cf2e024c19355090a1b48c966a99d6164
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIrY:vHW138/iXWlK885rKlGSekcj66ciy
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation izmix.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 izmix.exe 4964 xedob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language izmix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xedob.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe 4964 xedob.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 212 wrote to memory of 2572 212 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe 82 PID 212 wrote to memory of 2572 212 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe 82 PID 212 wrote to memory of 2572 212 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe 82 PID 212 wrote to memory of 1152 212 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe 83 PID 212 wrote to memory of 1152 212 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe 83 PID 212 wrote to memory of 1152 212 4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe 83 PID 2572 wrote to memory of 4964 2572 izmix.exe 94 PID 2572 wrote to memory of 4964 2572 izmix.exe 94 PID 2572 wrote to memory of 4964 2572 izmix.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe"C:\Users\Admin\AppData\Local\Temp\4af9cc7061bb604a8091424c394ac23aaf16e7031ecdb9048714cc89c64745d6N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\izmix.exe"C:\Users\Admin\AppData\Local\Temp\izmix.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\xedob.exe"C:\Users\Admin\AppData\Local\Temp\xedob.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD597165f500ef26497cbb33f984ff6ed11
SHA1936c9548cda4108c60f3b15f9736199e97ae0170
SHA256782352fb18b89f636c1f1664309984b1853e1a6567513e45ef4dc445e93893b3
SHA5121b30599891aa07950850a7ac7ae34316501ee6f3ea01ce0c26af443c71e8e419ba4341d80f0a74362944b1b0cfad8afba38094f543fdd1995c81241e9c061081
-
Filesize
512B
MD54f71ef62e800d17d5527ad5015ade7cc
SHA19834029101a2b4057691da76c4d03272d6bf0d90
SHA256d016892a06917f394c2eacce624901f9f68504785276a476f6c75163e5ae501d
SHA512efd01855d9e763175ecc4ee509dc4e8f8ddd6da74f218a1d0c11c010c905b13d6cadf48091559b4bfb0e5ed37e5efbd25fdf56956833a712b5c2da9c826c4f07
-
Filesize
335KB
MD5060d21ef459416f701a313dbb6554822
SHA1d7848b5b6dc1074f3cfb3a053332c301a138be8f
SHA2561dedc1d983f3cd1cf8c1e52435e08121f65465998b23eafcafd64280ee606d44
SHA51274996f486c4595f5e286f20d27a5b178b00714f0f9a5811441842968c17ca05f1e00a2fc0ea2723c7e23fec7c383bf88ef5f153eaca1ae4edc2bbd8b33a0ce71
-
Filesize
172KB
MD5b922f6985c7fead0e792c85b3448ab29
SHA1ec401e7a16b4a08c3838488ef766b22647c31237
SHA25624074fedb7294aa22336081cc6c0189bdfb04132c9b0412a94120292c8d6d3e9
SHA51259912b4c4a573dc769e636310330c7c33ea43a4308d2d1d90602d7e141305d7db1339e86610bb7730c3204b3d78ab113bdab6195d9f7f7a72ed0418af621e026