Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 21:52 UTC

General

  • Target

    e0087be66b4d1b522eff5b6816f83a83988c0c0131ef682a79ff07408a7e00a3.exe

  • Size

    362KB

  • MD5

    593981f49d9b763e4a07a1c216585be0

  • SHA1

    66dd4f47df867aab23d898695fd932c58021f147

  • SHA256

    e0087be66b4d1b522eff5b6816f83a83988c0c0131ef682a79ff07408a7e00a3

  • SHA512

    7f62b3592a4c1de2be04b37cd2ec072f994267f70a1cad877c0db946181dbd7b479a5681576ebbbb8da9344aed0699d76efe6add6f69c121a4776be61141d396

  • SSDEEP

    1536:LCIxFxA+WhzQJP/s4WaEYMUZXGIdlW/BJ7BDwatRsiifbX3WfC/B:2QxEJaLuRj6/B

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0087be66b4d1b522eff5b6816f83a83988c0c0131ef682a79ff07408a7e00a3.exe
    "C:\Users\Admin\AppData\Local\Temp\e0087be66b4d1b522eff5b6816f83a83988c0c0131ef682a79ff07408a7e00a3.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\e0087be66b4d1b522eff5b6816f83a83988c0c0131ef682a79ff07408a7e00a3.exe" >> NUL
      2⤵
        PID:852

    Network

    • flag-us
      DNS
      15.89.54.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.89.54.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
      Remote address:
      8.8.8.8:53
      Request
      7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
      IN PTR
      Response
    • flag-us
      DNS
      fox-killer3.ftp.narod.ru
      e0087be66b4d1b522eff5b6816f83a83988c0c0131ef682a79ff07408a7e00a3.exe
      Remote address:
      8.8.8.8:53
      Request
      fox-killer3.ftp.narod.ru
      IN A
      Response
    • 52.242.97.97:443
      52 B
      1
    • 104.46.162.224:443
      322 B
      7
    • 93.184.220.29:80
      322 B
      7
    • 209.197.3.8:80
      322 B
      7
    • 209.197.3.8:80
      322 B
      7
    • 209.197.3.8:80
      322 B
      7
    • 104.80.225.205:443
      322 B
      7
    • 20.54.89.106:443
      260 B
      5
    • 8.8.8.8:53
      15.89.54.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      15.89.54.20.in-addr.arpa

    • 8.8.8.8:53
      7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
      dns
      118 B
      204 B
      1
      1

      DNS Request

      7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa

    • 8.8.8.8:53
      fox-killer3.ftp.narod.ru
      dns
      e0087be66b4d1b522eff5b6816f83a83988c0c0131ef682a79ff07408a7e00a3.exe
      70 B
      132 B
      1
      1

      DNS Request

      fox-killer3.ftp.narod.ru

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3644-132-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/3644-133-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    • memory/3644-135-0x0000000000400000-0x000000000045D000-memory.dmp

      Filesize

      372KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.