Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    165s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 03:27 UTC

General

  • Target

    91c414d0f1a677d6d3bd7d890300720a57404a0c943ed99562f93ae7ac9098ac.exe

  • Size

    861KB

  • MD5

    68636da56c83715de2290164bcf756b0

  • SHA1

    5db1c14809b1573a7ee7625db8e8cb23c02f8983

  • SHA256

    91c414d0f1a677d6d3bd7d890300720a57404a0c943ed99562f93ae7ac9098ac

  • SHA512

    a006f38b32e7ad671264f4317c2f7293a78826cce5a937b893dc1466af8be3ae67032a7b89ce144768c1a5a32abe355a5fb7b2f9a96b42f3fcdb3387a121f098

  • SSDEEP

    24576:MRmJkcoQricOIQxiZY1iaC3bqaR5/cT0hO:ZJZoQrbTFZY1iaCNQ

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91c414d0f1a677d6d3bd7d890300720a57404a0c943ed99562f93ae7ac9098ac.exe
    "C:\Users\Admin\AppData\Local\Temp\91c414d0f1a677d6d3bd7d890300720a57404a0c943ed99562f93ae7ac9098ac.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Users\Admin\AppData\Local\Temp\91c414d0f1a677d6d3bd7d890300720a57404a0c943ed99562f93ae7ac9098ac.exe
      "C:\Users\Admin\AppData\Local\Temp\91c414d0f1a677d6d3bd7d890300720a57404a0c943ed99562f93ae7ac9098ac.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2708

Network

  • flag-us
    DNS
    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • flag-us
    DNS
    api.bing.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    api.bing.com
    IN A
    Response
    api.bing.com
    IN CNAME
    api-bing-com.e-0001.e-msedge.net
    api-bing-com.e-0001.e-msedge.net
    IN CNAME
    afd.e-0001.e-dc-msedge.net
    afd.e-0001.e-dc-msedge.net
    IN CNAME
    e-0001.e-dc-msedge.net
    e-0001.e-dc-msedge.net
    IN A
    13.107.13.80
  • flag-us
    DNS
    226.101.242.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    226.101.242.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • 67.26.109.254:80
    46 B
    40 B
    1
    1
  • 52.109.8.45:443
    40 B
    1
  • 51.132.193.104:443
    322 B
    7
  • 87.248.202.1:80
    322 B
    7
  • 87.248.202.1:80
    322 B
    7
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls, http2
    IEXPLORE.EXE
    1.2kB
    8.1kB
    15
    14
  • 204.79.197.200:443
    ieonline.microsoft.com
    IEXPLORE.EXE
    156 B
    3
  • 8.8.8.8:53
    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa

  • 8.8.8.8:53
    api.bing.com
    dns
    IEXPLORE.EXE
    58 B
    171 B
    1
    1

    DNS Request

    api.bing.com

    DNS Response

    13.107.13.80

  • 8.8.8.8:53
    226.101.242.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    226.101.242.52.in-addr.arpa

  • 8.8.8.8:53
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/524-132-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB

  • memory/524-137-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB

  • memory/2688-134-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2688-136-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2688-138-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2688-140-0x0000000000A20000-0x0000000000A6E000-memory.dmp

    Filesize

    312KB

  • memory/2688-139-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.