Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    190s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 14:28 UTC

General

  • Target

    361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe

  • Size

    935KB

  • MD5

    24b04e3b009b618ddc491de2221e4686

  • SHA1

    7fb5160ecf7d6e47cde16509932bd31a75ef2450

  • SHA256

    361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615

  • SHA512

    3e2085aa1289b0636ec24ee926d4ad4decdcadbbc0187af64b4314831080693335b0159dfe0bd753a103bc0a8c005df0714ed6fa6e475523f4f750e5b88e77da

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:JyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe
    "C:\Users\Admin\AppData\Local\Temp\361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Local\Temp\361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe
      "C:\Users\Admin\AppData\Local\Temp\361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe" Track="0001001000"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1220

Network

  • flag-unknown
    DNS
    kou1mjl.bo0v3029w.com
    361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe
    Remote address:
    8.8.8.8:53
    Request
    kou1mjl.bo0v3029w.com
    IN A
    Response
  • flag-unknown
    DNS
    kou1mjl.bo0v3029w.com
    361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe
    Remote address:
    8.8.8.8:53
    Request
    kou1mjl.bo0v3029w.com
    IN A
    Response
  • flag-unknown
    DNS
    96.108.152.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    96.108.152.52.in-addr.arpa
    IN PTR
    Response
  • flag-unknown
    DNS
    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • 72.21.91.29:80
    46 B
    40 B
    1
    1
  • 52.182.143.208:443
    322 B
    7
  • 20.190.159.68:443
    260 B
    5
  • 20.190.159.71:443
    260 B
    5
  • 8.8.8.8:53
    kou1mjl.bo0v3029w.com
    dns
    361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe
    67 B
    140 B
    1
    1

    DNS Request

    kou1mjl.bo0v3029w.com

  • 8.8.8.8:53
    kou1mjl.bo0v3029w.com
    dns
    361b73e7a6b9734adfa4cdf7e8a851c87e9cd5f07582ddf4f20bed2b9e074615.exe
    67 B
    140 B
    1
    1

    DNS Request

    kou1mjl.bo0v3029w.com

  • 8.8.8.8:53
    96.108.152.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    96.108.152.52.in-addr.arpa

  • 8.8.8.8:53
    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1220-133-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/1220-135-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/1220-136-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/1220-137-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/1220-138-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/1220-139-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.