Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 06:43 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe
Resource
win10v2004-20220812-en
General
-
Target
b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe
-
Size
1.3MB
-
MD5
e867c7382bd896173cf93011b5cd1162
-
SHA1
c55a1e851c28e92c95e05fe94cc0e951471e8f5a
-
SHA256
b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb
-
SHA512
f6453cd93fdaa9dab030f1f1cbf4fb318dcbbbc42157297b450bd5b6bb0cb66d2d456c76c0794c7e5bdb095ce83f11223b8eb85072eb6636b5a534cbe89cdbe7
-
SSDEEP
24576:jrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPaks:jrKo4ZwCOnYjVmJPa3
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5104 set thread context of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2732 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 2732 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 2732 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 2732 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 2732 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81 PID 5104 wrote to memory of 2732 5104 b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe"C:\Users\Admin\AppData\Local\Temp\b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
-
DNShrbeuc3jfiuor7t.0roptbgg23.comb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exeRemote address:8.8.8.8:53Requesthrbeuc3jfiuor7t.0roptbgg23.comIN AResponsehrbeuc3jfiuor7t.0roptbgg23.comIN A5.79.71.225hrbeuc3jfiuor7t.0roptbgg23.comIN A85.17.31.82hrbeuc3jfiuor7t.0roptbgg23.comIN A85.17.31.122hrbeuc3jfiuor7t.0roptbgg23.comIN A178.162.203.202hrbeuc3jfiuor7t.0roptbgg23.comIN A178.162.203.211hrbeuc3jfiuor7t.0roptbgg23.comIN A178.162.203.226hrbeuc3jfiuor7t.0roptbgg23.comIN A178.162.217.107hrbeuc3jfiuor7t.0roptbgg23.comIN A5.79.71.205
-
GEThttp://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffcb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exeRemote address:5.79.71.225:80RequestGET /b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc HTTP/1.1
Accept: */*
Proxy-authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: hrbeuc3jfiuor7t.0roptbgg23.com
Connection: Keep-Alive
-
GEThttp://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffcb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exeRemote address:5.79.71.225:80RequestGET /b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc HTTP/1.1
Accept: */*
Proxy-authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: hrbeuc3jfiuor7t.0roptbgg23.com
Connection: Keep-Alive
-
GEThttp://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffcb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exeRemote address:5.79.71.225:80RequestGET /b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc HTTP/1.1
Accept: */*
Proxy-authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: hrbeuc3jfiuor7t.0roptbgg23.com
Connection: Keep-Alive
-
GEThttp://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffcb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exeRemote address:85.17.31.82:80RequestGET /b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc HTTP/1.1
Accept: */*
Proxy-authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: hrbeuc3jfiuor7t.0roptbgg23.com
Connection: Keep-Alive
-
POSThttp://hrbeuc3jfiuor7t.0roptbgg23.com/__dmp__/b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exeRemote address:85.17.31.82:80RequestPOST /__dmp__/ HTTP/1.1
User-Agent: dBrowser 1 CallGetResponse:1
Host: hrbeuc3jfiuor7t.0roptbgg23.com
Content-Length: 1291
Cache-Control: no-cache
-
Remote address:8.8.8.8:53Request151.122.125.40.in-addr.arpaIN PTRResponse
-
POSThttp://hrbeuc3jfiuor7t.0roptbgg23.com/__dmp__/b9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exeRemote address:85.17.31.82:80RequestPOST /__dmp__/ HTTP/1.1
User-Agent: session
Host: hrbeuc3jfiuor7t.0roptbgg23.com
Content-Length: 3763
Cache-Control: no-cache
-
Remote address:8.8.8.8:53Requestd.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.5.0.8.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTRResponse
-
322 B 7
-
260 B 5
-
5.79.71.225:80http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffchttpb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe664 B 225 B 6 5
HTTP Request
GET http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc -
5.79.71.225:80http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffchttpb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe664 B 225 B 6 5
HTTP Request
GET http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc -
5.79.71.225:80http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffchttpb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe664 B 225 B 6 5
HTTP Request
GET http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc -
5.79.71.225:80hrbeuc3jfiuor7t.0roptbgg23.comb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe260 B 5
-
260 B 5
-
85.17.31.82:80http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffchttpb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe664 B 225 B 6 5
HTTP Request
GET http://hrbeuc3jfiuor7t.0roptbgg23.com/b4513939ea16223cb31f2cab12e501755f371ceb1fb4e047ce6584c7ea53d0935145a8edfd0057093be689e516e9d5727440affbe57d717d37465e5479719a9fb76a43f5ddfb0ffc -
85.17.31.82:80http://hrbeuc3jfiuor7t.0roptbgg23.com/__dmp__/httpb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe1.8kB 265 B 7 6
HTTP Request
POST http://hrbeuc3jfiuor7t.0roptbgg23.com/__dmp__/ -
322 B 7
-
85.17.31.82:80http://hrbeuc3jfiuor7t.0roptbgg23.com/__dmp__/httpb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe8.2kB 345 B 12 8
HTTP Request
POST http://hrbeuc3jfiuor7t.0roptbgg23.com/__dmp__/ -
322 B 7
-
322 B 7
-
8.8.8.8:53hrbeuc3jfiuor7t.0roptbgg23.comdnsb9c80e748a041b673977567e499cc3a7a4c5957f893d7f3c25938c8be2008ecb.exe76 B 204 B 1 1
DNS Request
hrbeuc3jfiuor7t.0roptbgg23.com
DNS Response
5.79.71.22585.17.31.8285.17.31.122178.162.203.202178.162.203.211178.162.203.226178.162.217.1075.79.71.205
-
73 B 159 B 1 1
DNS Request
151.122.125.40.in-addr.arpa
-
118 B 204 B 1 1
DNS Request
d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.5.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa