Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe
Resource
win7-20240903-en
General
-
Target
e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe
-
Size
336KB
-
MD5
264d6e40e3ec8e7a2f498e503f1c0600
-
SHA1
721743fc6ebafe6aa19eb6f7bd90cf336ad10afb
-
SHA256
e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bf
-
SHA512
b909bcda0fbebcd2d383ed5f7966954acab88858f8c920c0d4b2635ddd852457a2bf46878b97b798ed1722894ebdd9d1d6f8e88b7381ac0cf324cfcc7762f4ba
-
SSDEEP
6144:nvHWrZ+i8/iYiVst4UKVRw8pDrKlGSeNWcx1RsF9gc+XYIcEc:vHW138/iXWlK885rKlGSekcj66cig
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2732 afwix.exe 1980 atomo.exe -
Loads dropped DLL 2 IoCs
pid Process 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 2732 afwix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afwix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atomo.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe 1980 atomo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2732 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 30 PID 2716 wrote to memory of 2732 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 30 PID 2716 wrote to memory of 2732 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 30 PID 2716 wrote to memory of 2732 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 30 PID 2716 wrote to memory of 2916 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 31 PID 2716 wrote to memory of 2916 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 31 PID 2716 wrote to memory of 2916 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 31 PID 2716 wrote to memory of 2916 2716 e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe 31 PID 2732 wrote to memory of 1980 2732 afwix.exe 34 PID 2732 wrote to memory of 1980 2732 afwix.exe 34 PID 2732 wrote to memory of 1980 2732 afwix.exe 34 PID 2732 wrote to memory of 1980 2732 afwix.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe"C:\Users\Admin\AppData\Local\Temp\e9d252e2f88acbdb94168255224d75ad0dd280b6a80f382d61be56cc173c48bfN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\afwix.exe"C:\Users\Admin\AppData\Local\Temp\afwix.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\atomo.exe"C:\Users\Admin\AppData\Local\Temp\atomo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342B
MD5e3cefe813af42936d8451f502211632d
SHA1209d59c2c4afaefe766f23edcdae0166537a30a1
SHA256157856986cba0de974eb035ef94bd102cc60f6188146d40232340e663a204451
SHA512fdd4624aec91afecd4cd4d32ee9d501ef4aa4e48461d32ee35009e77edf36ad3c4c58618995d1900ffb7ebb831c9cb599b10e6010c23c7cf01599950cadc83f5
-
Filesize
512B
MD57bae3d25662c3f3000f2f60ef61df2d8
SHA11115611126cacb79d3330ce381cdc780bb640db5
SHA256b2e48508c9972d530cd275f2309ab1cb143cca2561587d5bf20d18cf59c80e3b
SHA512ef765c02d4c90aa31a9a98672dbef86cdc1f29c126c6e97a88a3937bae1798564be9345e00331d109061c94d5e643fb8e84151d9668cf240d1795e169537867d
-
Filesize
336KB
MD5993ddc99f39433bda305f1ef8bb1c205
SHA1788ef12f774818915f268e7ca86d826958e5d063
SHA2568ae52a3e54de58e18d96f98d1ed3d363ddf8fa5b80f3ab00bee3c91185f44eda
SHA5126e29b9efc92be34752a3a73bd5ce5f70c8594d05db7c78f1f178b69aba40b042f1920567773adc5992f958baab0181187bf50f92ca0f99e310b26ea07c887b92
-
Filesize
172KB
MD5bfb798b684cfd777bc95c2e30206481d
SHA164c08d67aa03ec88c12d62c916f29450d2ac4d30
SHA256bd5dfdd9e2293da4b6d7cbc063d169dc9d4b70d9ea64901e9cc9bb1bcd8423b2
SHA512fc23190dfd51a0e6adfae5652b6cab53da8578c8f2b39ba2c94390d2f88655f6a2a3fa923b6925624289c430526b7e11a570ec6b3c0fc15109d906102b7b977f