Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 12:07

General

  • Target

    c54bde19a8f05f8f5a4914f30df8c1f6bf9e3d6ca01804ad3a52ac02ca69160f.exe

  • Size

    68KB

  • MD5

    6dfe25a15012dbd95fbc45ec80f7b975

  • SHA1

    92f370c5832610a2de6028af204c1b65ca14efee

  • SHA256

    c54bde19a8f05f8f5a4914f30df8c1f6bf9e3d6ca01804ad3a52ac02ca69160f

  • SHA512

    a5acdf162d7a3d0dba545cb44d701e551bc4f9f8530b924b85b55882cff58136e9cbe48899236a04bb177dc0bfbaa8f7bb87b7e40af458f7ea00a25288202ed4

  • SSDEEP

    1536:v6fqsAPQYGmPzmZDDZrV8sMQXGkfn33n7z5WeIuhCarH:yLAYUzmdD0sMQl7d7IuhCaD

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c54bde19a8f05f8f5a4914f30df8c1f6bf9e3d6ca01804ad3a52ac02ca69160f.exe
    "C:\Users\Admin\AppData\Local\Temp\c54bde19a8f05f8f5a4914f30df8c1f6bf9e3d6ca01804ad3a52ac02ca69160f.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2956
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    1c9b2720af0ca9528b47898d9c7f4799

    SHA1

    80495f16e333f54ecc700252323c2a7cb7d751e1

    SHA256

    d1ea9a17b5a635a121e82e7963d3b134f74050da9debcd40c9622f50c5d38fe5

    SHA512

    5afe876f2cd887458656b1747bce08d03f26ef286bcc83efa93e0111be856d0564bee4d6ef5637c167626bac121f7371b69c7952502d47784ac9ad568bf53eac

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    128fa6d186dfe4aee9754c9e5c98ae3e

    SHA1

    4d73daced277eb4ccfb7d7791ac877acec111af2

    SHA256

    994abfcee0493355ce8bc9508ea00df8d41c56453cbc41dca6025f88e995a34c

    SHA512

    03f9b22e9f95e5ad9483019276b8c0e94e0cb03d98ca4afa0e1a2065c767aae340dede88078378b752eb521b48b6ad8dc1305b969e7d45324b3af88dd98b0f4c

  • \Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    68KB

    MD5

    756c28fd7059c290cd61033d20fba73f

    SHA1

    af1063c4908ef8156936416db75bdd2ff9a32bb5

    SHA256

    c810541abb3cd6b83a9973eb2088403c5aed448adbcacf0dece4c59cd8c14049

    SHA512

    0990930e206aca243469ab23367f7d6aa82dd48010132bbcff8f4754eff45f6edf3e135122d4432df9b0c5a2cad8d088438381b1ff073f10ce12046d6663fdd0

  • memory/2516-0-0x0000000001170000-0x0000000001197000-memory.dmp

    Filesize

    156KB

  • memory/2516-6-0x00000000009C0000-0x00000000009E7000-memory.dmp

    Filesize

    156KB

  • memory/2516-18-0x0000000001170000-0x0000000001197000-memory.dmp

    Filesize

    156KB

  • memory/2956-10-0x0000000000190000-0x00000000001B7000-memory.dmp

    Filesize

    156KB

  • memory/2956-21-0x0000000000190000-0x00000000001B7000-memory.dmp

    Filesize

    156KB

  • memory/2956-23-0x0000000000190000-0x00000000001B7000-memory.dmp

    Filesize

    156KB

  • memory/2956-30-0x0000000000190000-0x00000000001B7000-memory.dmp

    Filesize

    156KB