Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    165s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 15:09 UTC

General

  • Target

    0e137f7645e4ad425c9b9f62b3e4030c74c437f8dd073aabd94826abf9a7ac78.exe

  • Size

    132KB

  • MD5

    822a513f24b55f76f92aff31447b91ca

  • SHA1

    3bdbe6668db40a4de353073a84125d3f39ed999e

  • SHA256

    0e137f7645e4ad425c9b9f62b3e4030c74c437f8dd073aabd94826abf9a7ac78

  • SHA512

    8b3b1236c532c9f011309886be278513dfad39eda42706c64f294599266c06ce1ca57b2a55285264af8fc052e9213a05815dede007d08734f4dd88489ca66262

  • SSDEEP

    3072:pMPcvqBCJvM6VPabBYG2rGPXklgR+R1szfy:UOcKFC7klh4O

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e137f7645e4ad425c9b9f62b3e4030c74c437f8dd073aabd94826abf9a7ac78.exe
    "C:\Users\Admin\AppData\Local\Temp\0e137f7645e4ad425c9b9f62b3e4030c74c437f8dd073aabd94826abf9a7ac78.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4808
    • \??\c:\windows\setdebugnt.exe
      c:\windows\setdebugnt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:4440

Network

  • flag-us
    DNS
    www.supernet.speedserv.com
    setdebugnt.exe
    Remote address:
    8.8.8.8:53
    Request
    www.supernet.speedserv.com
    IN A
    Response
  • flag-us
    DNS
    smtp.mail.yahoo.com.br
    setdebugnt.exe
    Remote address:
    8.8.8.8:53
    Request
    smtp.mail.yahoo.com.br
    IN A
    Response
    smtp.mail.yahoo.com.br
    IN CNAME
    smtp.mail.yahoo.com
    smtp.mail.yahoo.com
    IN CNAME
    smtp.mail.global.gm0.yahoodns.net
    smtp.mail.global.gm0.yahoodns.net
    IN A
    87.248.97.36
  • flag-us
    DNS
    106.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    106.89.54.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • 209.197.3.8:80
    46 B
    40 B
    1
    1
  • 72.21.91.29:80
    46 B
    40 B
    1
    1
  • 87.248.97.36:25
    smtp.mail.yahoo.com.br
    setdebugnt.exe
    260 B
    5
  • 8.238.20.126:80
    322 B
    7
  • 20.54.89.106:443
    260 B
    5
  • 13.89.179.8:443
    322 B
    7
  • 8.238.20.126:80
    322 B
    7
  • 8.238.20.126:80
    322 B
    7
  • 8.253.208.120:80
    322 B
    7
  • 8.8.8.8:53
    www.supernet.speedserv.com
    dns
    setdebugnt.exe
    72 B
    141 B
    1
    1

    DNS Request

    www.supernet.speedserv.com

  • 8.8.8.8:53
    smtp.mail.yahoo.com.br
    dns
    setdebugnt.exe
    68 B
    164 B
    1
    1

    DNS Request

    smtp.mail.yahoo.com.br

    DNS Response

    87.248.97.36

  • 8.8.8.8:53
    106.89.54.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    106.89.54.20.in-addr.arpa

  • 8.8.8.8:53
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\setdebugnt.exe

    Filesize

    132KB

    MD5

    822a513f24b55f76f92aff31447b91ca

    SHA1

    3bdbe6668db40a4de353073a84125d3f39ed999e

    SHA256

    0e137f7645e4ad425c9b9f62b3e4030c74c437f8dd073aabd94826abf9a7ac78

    SHA512

    8b3b1236c532c9f011309886be278513dfad39eda42706c64f294599266c06ce1ca57b2a55285264af8fc052e9213a05815dede007d08734f4dd88489ca66262

  • \??\c:\windows\setdebugnt.exe

    Filesize

    132KB

    MD5

    822a513f24b55f76f92aff31447b91ca

    SHA1

    3bdbe6668db40a4de353073a84125d3f39ed999e

    SHA256

    0e137f7645e4ad425c9b9f62b3e4030c74c437f8dd073aabd94826abf9a7ac78

    SHA512

    8b3b1236c532c9f011309886be278513dfad39eda42706c64f294599266c06ce1ca57b2a55285264af8fc052e9213a05815dede007d08734f4dd88489ca66262

  • memory/4440-140-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/4440-142-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/4808-132-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/4808-141-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.