Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25/06/2022, 17:21 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe
Resource
win10v2004-20220414-en
General
-
Target
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe
-
Size
1.8MB
-
MD5
b826bb2b62dab956a48a12d4e27ea3a5
-
SHA1
b3dfdb88640cfad86d42d7f65bc70fb7831076c0
-
SHA256
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759
-
SHA512
c15233dedf2fc24de8d8f5f01c63e98a2844c18303dc3b10528e1441067c1b1f85a32f417027ea90a7f4c82764cf2a53482300e8af54a4055c0cfa4c713c2c03
Malware Config
Signatures
-
suricata: ET MALWARE Legion Loader Activity Observed (suspira)
suricata: ET MALWARE Legion Loader Activity Observed (suspira)
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 580 1796 WerFault.exe 24 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30 PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30 PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30 PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe"C:\Users\Admin\AppData\Local\Temp\3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 8722⤵
- Program crash
PID:580
-
Network
-
Remote address:8.8.8.8:53Requestfastupdate1.topIN AResponse
-
Remote address:8.8.8.8:53Requestiplogger.orgIN AResponseiplogger.orgIN A148.251.234.83
-
Remote address:148.251.234.83:80RequestGET /1lGui HTTP/1.1
Accept: text/*
User-Agent: suspiria
Host: iplogger.org
ResponseHTTP/1.1 301 Moved Permanently
Date: Sat, 25 Jun 2022 17:21:51 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
Location: https://iplogger.org/1lGui
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
-
Remote address:8.8.8.8:53Requestfastupdate2.topIN AResponse
-
Remote address:8.8.8.8:53Requestfastupdate2.topIN AResponse
-
Remote address:8.8.8.8:53Requestfastupdate2.topIN AResponse
-
Remote address:8.8.8.8:53Requestfastupdate2.topIN AResponse
-
Remote address:8.8.8.8:53Requestfastupdate2.topIN AResponse
-
Remote address:8.8.8.8:53Requestfastupdate2.topIN AResponse
-
148.251.234.83:80http://iplogger.org/1lGuihttp3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe317 B 1.0kB 5 5
HTTP Request
GET http://iplogger.org/1lGuiHTTP Response
301 -
148.251.234.83:443iplogger.orgtls3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe393 B 219 B 5 5
-
148.251.234.83:443iplogger.orgtls3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe355 B 219 B 5 5
-
148.251.234.83:443iplogger.orgtls3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe288 B 219 B 5 5
-
148.251.234.83:443iplogger.org3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe190 B 92 B 4 2
-
61 B 131 B 1 1
DNS Request
fastupdate1.top
-
58 B 74 B 1 1
DNS Request
iplogger.org
DNS Response
148.251.234.83
-
183 B 183 B 3 3
DNS Request
fastupdate2.top
DNS Request
fastupdate2.top
DNS Request
fastupdate2.top
-
183 B 183 B 3 3
DNS Request
fastupdate2.top
DNS Request
fastupdate2.top
DNS Request
fastupdate2.top