Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 08:31 UTC

General

  • Target

    f9501e653e10425989badf1e8bffaab22c3744843c07e04222a89e33c4ba2f06.exe

  • Size

    1.3MB

  • MD5

    0ec4899286a57eceb4f5a2335461b883

  • SHA1

    8872820c47c6eeaf8845ec798c591e478977c097

  • SHA256

    f9501e653e10425989badf1e8bffaab22c3744843c07e04222a89e33c4ba2f06

  • SHA512

    63f707b102fe4113859a6f16483fdc5bcff725e0983a9fe789291e7faf8849f7ae7e6f96eb0aff1ca1d9d0c0ac70a39178ec1a7b4da8589a02f3f0fb10c353c8

  • SSDEEP

    24576:zrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPake:zrKo4ZwCOnYjVmJPa5

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9501e653e10425989badf1e8bffaab22c3744843c07e04222a89e33c4ba2f06.exe
    "C:\Users\Admin\AppData\Local\Temp\f9501e653e10425989badf1e8bffaab22c3744843c07e04222a89e33c4ba2f06.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Users\Admin\AppData\Local\Temp\f9501e653e10425989badf1e8bffaab22c3744843c07e04222a89e33c4ba2f06.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1984

Network

  • flag-unknown
    DNS
    0xemu3fv.tyo8hbshm6.com
    f9501e653e10425989badf1e8bffaab22c3744843c07e04222a89e33c4ba2f06.exe
    Remote address:
    8.8.8.8:53
    Request
    0xemu3fv.tyo8hbshm6.com
    IN A
    Response
  • flag-unknown
    DNS
    97.97.242.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.97.242.52.in-addr.arpa
    IN PTR
    Response
  • flag-unknown
    DNS
    176.122.125.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    176.122.125.40.in-addr.arpa
    IN PTR
    Response
  • 8.238.20.254:80
    52 B
    1
  • 8.238.20.126:80
    322 B
    7
  • 8.238.20.126:80
    322 B
    7
  • 8.253.208.120:80
    322 B
    7
  • 8.253.208.120:80
    46 B
    40 B
    1
    1
  • 20.73.194.208:443
  • 8.8.8.8:53
    0xemu3fv.tyo8hbshm6.com
    dns
    f9501e653e10425989badf1e8bffaab22c3744843c07e04222a89e33c4ba2f06.exe
    69 B
    142 B
    1
    1

    DNS Request

    0xemu3fv.tyo8hbshm6.com

  • 8.8.8.8:53
    97.97.242.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.97.242.52.in-addr.arpa

  • 8.8.8.8:53
    176.122.125.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    176.122.125.40.in-addr.arpa

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1984-133-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1984-134-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1984-135-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1984-136-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1984-137-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.