Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 07:12 UTC

General

  • Target

    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe

  • Size

    315KB

  • MD5

    52bcc835777e96b16d7d444ae9380540

  • SHA1

    87579eb6000287675ef6a878bda975b8b0f28457

  • SHA256

    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc

  • SHA512

    754f0558176da4e0f907451f85f1990c6b5b28b34ec99f4239f05fa05e1a554c798acb9c1f5fe89b6df5d27526f207e2ce9627938437c49e58740d9f6926b85a

  • SSDEEP

    6144:frpbUzkuvcBYC47l2xyfalkLUsx4Y0k8ojcX/pJ2enmrIJzO1LBut0njxxuQ9Uk2:frakuveY3hfaaLUsx4JkxjYJ2emrCz2G

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    "C:\Users\Admin\AppData\Local\Temp\58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    PID:832

Network

  • flag-us
    DNS
    c1.downlloaddatamy.info
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    Remote address:
    8.8.8.8:53
    Request
    c1.downlloaddatamy.info
    IN A
    Response
  • flag-us
    DNS
    r1.getapplicationmy.info
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    Remote address:
    8.8.8.8:53
    Request
    r1.getapplicationmy.info
    IN A
    Response
    r1.getapplicationmy.info
    IN A
    94.229.72.122
  • flag-us
    DNS
    c2.downlloaddatamy.info
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    Remote address:
    8.8.8.8:53
    Request
    c2.downlloaddatamy.info
    IN A
    Response
  • flag-us
    DNS
    r2.getapplicationmy.info
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    Remote address:
    8.8.8.8:53
    Request
    r2.getapplicationmy.info
    IN A
    Response
    r2.getapplicationmy.info
    IN A
    162.210.196.173
  • 94.229.72.122:80
    r1.getapplicationmy.info
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    152 B
    3
  • 162.210.196.173:80
    r2.getapplicationmy.info
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    152 B
    3
  • 8.8.8.8:53
    c1.downlloaddatamy.info
    dns
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    69 B
    148 B
    1
    1

    DNS Request

    c1.downlloaddatamy.info

  • 8.8.8.8:53
    r1.getapplicationmy.info
    dns
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    70 B
    86 B
    1
    1

    DNS Request

    r1.getapplicationmy.info

    DNS Response

    94.229.72.122

  • 8.8.8.8:53
    c2.downlloaddatamy.info
    dns
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    69 B
    148 B
    1
    1

    DNS Request

    c2.downlloaddatamy.info

  • 8.8.8.8:53
    r2.getapplicationmy.info
    dns
    58fe00e3e245de7eaf39ad644bed4a4e4842f957fa71addd631cd40e7882c6dc.exe
    70 B
    86 B
    1
    1

    DNS Request

    r2.getapplicationmy.info

    DNS Response

    162.210.196.173

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\TsuF7D17C85.dll

    Filesize

    269KB

    MD5

    af7ce801c8471c5cd19b366333c153c4

    SHA1

    4267749d020a362edbd25434ad65f98b073581f1

    SHA256

    cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e

    SHA512

    88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

  • \Users\Admin\AppData\Local\Temp\{8FA423BF-FB0D-4AC4-A82F-B32F54470149}\Custom.dll

    Filesize

    91KB

    MD5

    a6312af27b3d15b556341f63bce617ed

    SHA1

    27d5724ba3c3d14065184558a434a0e78e742edb

    SHA256

    432adc14aeb197e7bc24a77d29a18e82b7c02047efb3a354e0c2ce95719a8cae

    SHA512

    c08ec354dcd7e3455ad419d13d4cd3e748f8579b089baa9e0c0347ccd58bc80333d066fe291e5a120b58fe3603a8a084771f6d80c73c433c9b0f00931e4f3f8a

  • \Users\Admin\AppData\Local\Temp\{8FA423BF-FB0D-4AC4-A82F-B32F54470149}\_Setup.dll

    Filesize

    173KB

    MD5

    081c1ac0aaaaec8b4eb06c541a40592e

    SHA1

    bedb928c8c3a44942405de146c7b6bd63a438c65

    SHA256

    7db7c245ad224e7018f5478b3f7c4695144fe65319973c8c536840bba53e9ab8

    SHA512

    df96ea85e670ef0c58108d92683115480ef57174e341672edc26d111738560bbe17781a26fe62da2d9091fdfc6e1a70f1822b09f22be7893ebecd7d08dcc57b2

  • memory/832-55-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.