Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    168s
  • max time network
    229s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2022, 00:40 UTC

General

  • Target

    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe

  • Size

    304KB

  • MD5

    6697890568d19ea5fe33a4802cc67d08

  • SHA1

    fc129edc3bc075c796c2aea0b58c2991e74906b7

  • SHA256

    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36

  • SHA512

    f40fbc51d5759b99e7ccd48660b08e7de0c4d2be5ee078c5ef977d363ce40be495b636d18d3b3c16a3e85fa0c3ea6af684c0f2fb2a43d310854ef13b0d22bb1a

  • SSDEEP

    6144:VrkW9uEo2S1YnQmCX492DkwNP3qpYF4AqqWb+qR9h+uqkNfoM6YV5TmNa1a3SyPZ:Vrkuu6/eIo4tQW62T+uTwM6YVxm24Z

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    "C:\Users\Admin\AppData\Local\Temp\fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    PID:4836

Network

  • flag-unknown
    DNS
    r1.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    Remote address:
    8.8.8.8:53
    Request
    r1.getapplicationmy.info
    IN A
    Response
    r1.getapplicationmy.info
    IN A
    94.229.72.118
  • flag-unknown
    DNS
    c1.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    Remote address:
    8.8.8.8:53
    Request
    c1.getapplicationmy.info
    IN A
    Response
    c1.getapplicationmy.info
    IN A
    162.210.196.173
  • flag-unknown
    DNS
    r2.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    Remote address:
    8.8.8.8:53
    Request
    r2.getapplicationmy.info
    IN A
    Response
    r2.getapplicationmy.info
    IN A
    94.229.72.119
  • flag-unknown
    DNS
    c2.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    Remote address:
    8.8.8.8:53
    Request
    c2.getapplicationmy.info
    IN A
    Response
    c2.getapplicationmy.info
    IN A
    94.229.72.116
  • flag-unknown
    DNS
    151.122.125.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    151.122.125.40.in-addr.arpa
    IN PTR
    Response
  • flag-unknown
    DNS
    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • 93.184.221.240:80
    260 B
    5
  • 93.184.220.29:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 13.69.239.73:443
    322 B
    7
  • 162.210.196.173:80
    c1.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 94.229.72.118:80
    r1.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 94.229.72.119:80
    r2.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 94.229.72.116:80
    c2.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 162.210.196.173:80
    c1.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 104.80.224.44:443
    tls
    92 B
    111 B
    2
    2
  • 104.80.224.44:443
    tls
    92 B
    111 B
    2
    2
  • 94.229.72.116:80
    c2.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 162.210.196.173:80
    c1.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 94.229.72.116:80
    c2.getapplicationmy.info
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    260 B
    5
  • 8.8.8.8:53
    r1.getapplicationmy.info
    dns
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    70 B
    86 B
    1
    1

    DNS Request

    r1.getapplicationmy.info

    DNS Response

    94.229.72.118

  • 8.8.8.8:53
    c1.getapplicationmy.info
    dns
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    70 B
    86 B
    1
    1

    DNS Request

    c1.getapplicationmy.info

    DNS Response

    162.210.196.173

  • 8.8.8.8:53
    r2.getapplicationmy.info
    dns
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    70 B
    86 B
    1
    1

    DNS Request

    r2.getapplicationmy.info

    DNS Response

    94.229.72.119

  • 8.8.8.8:53
    c2.getapplicationmy.info
    dns
    fa447591924895e5f0936d85dda60b327792e47fc34ae9c56b1b3fba4267ff36.exe
    70 B
    86 B
    1
    1

    DNS Request

    c2.getapplicationmy.info

    DNS Response

    94.229.72.116

  • 8.8.8.8:53
    151.122.125.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    151.122.125.40.in-addr.arpa

  • 8.8.8.8:53
    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    7.6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TsuD0710D8C.dll

    Filesize

    269KB

    MD5

    af7ce801c8471c5cd19b366333c153c4

    SHA1

    4267749d020a362edbd25434ad65f98b073581f1

    SHA256

    cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e

    SHA512

    88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

  • C:\Users\Admin\AppData\Local\Temp\{15135E77-001C-4B14-A9FF-483ECEF07C81}\Custom.dll

    Filesize

    73KB

    MD5

    56e4e9e881524397c9f6dca5ca70b1e8

    SHA1

    8ad77bad589591171eb94a593c3814a3b742f79c

    SHA256

    2e6e83c80a887c82c890053f491e0cb24074967b5ae7af7c8c4bcae78af2a22b

    SHA512

    130c83dfc0db281bd7999edc6c295f122ab3ba00c69353daad988866680a6994365874eb29122b8473930d2ba0df58bdfb27eb8897a819f79c8b8e31e6597700

  • C:\Users\Admin\AppData\Local\Temp\{15135E77-001C-4B14-A9FF-483ECEF07C81}\_Setup.dll

    Filesize

    168KB

    MD5

    9f8992a651c85604676b2bbf54830547

    SHA1

    bd2a5cd0038899d97d7c652056c948c33c5bc83d

    SHA256

    61fef12b10bb745094ec1392da30c357d508c2befafddd354cad9922feca8ed4

    SHA512

    a6d7692bdbf1a19eb582150d5387faf7d08119f7b111a809c3b55f9de5ee74481b62a1a745f6ed3817ac4c0245ca52e4db8026690ba6a48d3006d47771b60ed7

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.