Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 20:05 UTC

General

  • Target

    4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e.exe

  • Size

    1.1MB

  • MD5

    bd8427f2e695f5eb6225215558db9093

  • SHA1

    8686cacf69daa2ce2e09d54d0ab1fa4c5073eb0d

  • SHA256

    4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e

  • SHA512

    bf5a9a379b540e41bb3d2c0304bacbd69cc5cda45783bf08d437b225ba5b334a0955c9893c51fd41b829f5d2ff85c344b601bdf9b3504ff3ca4c4dee9c96d822

  • SSDEEP

    24576:pophjgKvHM2Xl2DNtewU5GcK+vcG1vB7Dm/LOElX:qphjhs2qNteVMcK+vB1vFDRE1

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e.exe
    "C:\Users\Admin\AppData\Local\Temp\4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e.exe
      "C:\Users\Admin\AppData\Local\Temp\4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e.exe" Track="0001001000"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2496

Network

  • flag-unknown
    DNS
    i7u9m90fgrb.hm8brk1h.com
    4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e.exe
    Remote address:
    8.8.8.8:53
    Request
    i7u9m90fgrb.hm8brk1h.com
    IN A
    Response
  • flag-unknown
    DNS
    15.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.89.54.20.in-addr.arpa
    IN PTR
    Response
  • flag-unknown
    DNS
    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • 72.21.81.240:80
    92 B
    80 B
    2
    2
  • 20.189.173.4:443
    322 B
    7
  • 104.80.224.44:443
    tls
    92 B
    111 B
    2
    2
  • 104.80.224.44:443
    tls
    92 B
    111 B
    2
    2
  • 104.80.225.205:443
    322 B
    7
  • 96.16.53.137:80
    322 B
    7
  • 8.8.8.8:53
    i7u9m90fgrb.hm8brk1h.com
    dns
    4f1ea9f2ddc40937e4fbfbd1d1f4f0dfe0caf3e9af59dc7e8061e173b428252e.exe
    70 B
    143 B
    1
    1

    DNS Request

    i7u9m90fgrb.hm8brk1h.com

  • 8.8.8.8:53
    15.89.54.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    15.89.54.20.in-addr.arpa

  • 8.8.8.8:53
    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    f.7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2392-132-0x0000000000400000-0x0000000000586000-memory.dmp

    Filesize

    1.5MB

  • memory/2392-133-0x00000000006A0000-0x00000000006A3000-memory.dmp

    Filesize

    12KB

  • memory/2392-137-0x0000000000400000-0x0000000000586000-memory.dmp

    Filesize

    1.5MB

  • memory/2496-135-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB

  • memory/2496-136-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB

  • memory/2496-138-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB

  • memory/2496-139-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB

  • memory/2496-140-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.