Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2022, 03:25 UTC

General

  • Target

    65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d.exe

  • Size

    1.7MB

  • MD5

    2f8818720cd7e37f57e22869803c8ec6

  • SHA1

    f5824d0bb8827d4e53b7967f054fc6a3414b09fc

  • SHA256

    65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d

  • SHA512

    201378bb521ca7c0d75831c94d1afbdbfbbbedce0375887a6cc775777d9afa02ba118fda2aecdc9312dc66a79d690cc027bb873fed889f725e75cc2c72354bce

  • SSDEEP

    49152:4unfBJta0Slsp0TccLVPjFasQ2SejqE+Uz1h:4KfBJqS2TceJhaskUz1h

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d.exe
    "C:\Users\Admin\AppData\Local\Temp\65b763aad0dd4ce896633c44e1ecdc68a3b02448ed0d4c9df8f4f5fbd8012c5d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" .\ORB7qov.BI -U -S
      2⤵
      • Loads dropped DLL
      PID:2708

Network

  • flag-unknown
    DNS
    15.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.89.54.20.in-addr.arpa
    IN PTR
  • flag-unknown
    DNS
    15.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.89.54.20.in-addr.arpa
    IN PTR
  • flag-unknown
    DNS
    15.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.89.54.20.in-addr.arpa
    IN PTR
  • flag-unknown
    DNS
    15.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.89.54.20.in-addr.arpa
    IN PTR
  • flag-unknown
    DNS
    15.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.89.54.20.in-addr.arpa
    IN PTR
  • 93.184.220.29:80
    322 B
    7
  • 93.184.220.29:80
    322 B
    7
  • 93.184.220.29:80
    260 B
    5
  • 8.253.225.254:80
    322 B
    7
  • 8.253.225.254:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 8.8.8.8:53
    15.89.54.20.in-addr.arpa
    dns
    350 B
    5

    DNS Request

    15.89.54.20.in-addr.arpa

    DNS Request

    15.89.54.20.in-addr.arpa

    DNS Request

    15.89.54.20.in-addr.arpa

    DNS Request

    15.89.54.20.in-addr.arpa

    DNS Request

    15.89.54.20.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ORB7qov.BI

    Filesize

    1.7MB

    MD5

    a9d91c5c320f515793506a7b1dc8b63a

    SHA1

    2d7dcc156541f9b39eacd12fdae7010ed280d51f

    SHA256

    e288d2abd42a105cc6cd02a3bde35fcb55e67d851935c88ebf34ef0f6b63a1a2

    SHA512

    0054d1cd7238b8ba4350cc9cb5791f553d1c684b8fef8dac39b6e570ef5f1daa7b56e8a110c2514777aa00a7cc80be84f2db4acbe0fddd7420d1b42f4b845891

  • C:\Users\Admin\AppData\Local\Temp\ORB7qov.bI

    Filesize

    1.7MB

    MD5

    a9d91c5c320f515793506a7b1dc8b63a

    SHA1

    2d7dcc156541f9b39eacd12fdae7010ed280d51f

    SHA256

    e288d2abd42a105cc6cd02a3bde35fcb55e67d851935c88ebf34ef0f6b63a1a2

    SHA512

    0054d1cd7238b8ba4350cc9cb5791f553d1c684b8fef8dac39b6e570ef5f1daa7b56e8a110c2514777aa00a7cc80be84f2db4acbe0fddd7420d1b42f4b845891

  • memory/2708-136-0x0000000003280000-0x0000000003392000-memory.dmp

    Filesize

    1.1MB

  • memory/2708-135-0x0000000003030000-0x0000000003168000-memory.dmp

    Filesize

    1.2MB

  • memory/2708-137-0x00000000033A0000-0x000000000346B000-memory.dmp

    Filesize

    812KB

  • memory/2708-138-0x0000000003470000-0x0000000003527000-memory.dmp

    Filesize

    732KB

  • memory/2708-141-0x0000000003280000-0x0000000003392000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.