Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    195s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 03:40 UTC

General

  • Target

    2e5e15e46c4b4cfcdd0f0d40c1ad6ad2af6aeef7c7b64020ad5ce3b226bff392.exe

  • Size

    208KB

  • MD5

    8a34aae00d61e9abeb82a5c4367b7a2a

  • SHA1

    643ba6c00b9d4d41e66112a1c18e783823bd04fd

  • SHA256

    2e5e15e46c4b4cfcdd0f0d40c1ad6ad2af6aeef7c7b64020ad5ce3b226bff392

  • SHA512

    0605938a1943e1a378f3890ee1419973462b7fde14312e6658b022ea7a9b66e9c2b70b1cde66ab10758eb0ae91ea820cd3530121efcf977fd1cf993601ff3f68

  • SSDEEP

    6144:oAbw8PxcPIceMWjnNYxOBFWeH4/mHhbCvToSUe:YPI5XxJGboSUe

Score
8/10

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e5e15e46c4b4cfcdd0f0d40c1ad6ad2af6aeef7c7b64020ad5ce3b226bff392.exe
    "C:\Users\Admin\AppData\Local\Temp\2e5e15e46c4b4cfcdd0f0d40c1ad6ad2af6aeef7c7b64020ad5ce3b226bff392.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\2e5e15e46c4b4cfcdd0f0d40c1ad6ad2af6aeef7c7b64020ad5ce3b226bff392.exe
      /scomma "C:\Users\Admin\AppData\Local\Temp\LVUbqHaJrw.ini"
      2⤵
        PID:1848

    Network

    • flag-unknown
      DNS
      164.2.77.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      164.2.77.40.in-addr.arpa
      IN PTR
      Response
    • flag-unknown
      DNS
      2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
      Remote address:
      8.8.8.8:53
      Request
      2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
      IN PTR
      Response
    • 8.253.208.113:80
      322 B
      7
    • 8.253.208.113:80
      322 B
      7
    • 93.184.220.29:80
      322 B
      7
    • 8.253.208.113:80
      260 B
      5
    • 67.26.109.254:80
      260 B
      5
    • 8.8.8.8:53
      164.2.77.40.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      164.2.77.40.in-addr.arpa

    • 8.8.8.8:53
      2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
      dns
      118 B
      204 B
      1
      1

      DNS Request

      2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\LVUbqHaJrw.ini

      Filesize

      5B

      MD5

      d1ea279fb5559c020a1b4137dc4de237

      SHA1

      db6f8988af46b56216a6f0daf95ab8c9bdb57400

      SHA256

      fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

      SHA512

      720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

    • memory/1848-135-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1848-137-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1848-138-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1848-139-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1848-140-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.