Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 00:16 UTC

General

  • Target

    9bf2f997ca1077d7820d7e7d53622f694f45fd19ee934fb91fc772221e12eb4a.exe

  • Size

    62KB

  • MD5

    0a797adc3f086673bfceb8254c3912d4

  • SHA1

    0d3a2367d5625f30ac6deca128c339b6b5903776

  • SHA256

    9bf2f997ca1077d7820d7e7d53622f694f45fd19ee934fb91fc772221e12eb4a

  • SHA512

    7378ff873274e4bc1ad5032ecc30f9743e0266bac95c956b938195bc8d67ee8afe628f4f8d7874bb397e885933ade81b00846e899bf272d31ba3334ee185d8ea

  • SSDEEP

    1536:bpg6nW9+kdTx87Iwterf9KZezMv5oITjhyb5lZT:bpg6W5kRMf9BY5ooS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bf2f997ca1077d7820d7e7d53622f694f45fd19ee934fb91fc772221e12eb4a.exe
    "C:\Users\Admin\AppData\Local\Temp\9bf2f997ca1077d7820d7e7d53622f694f45fd19ee934fb91fc772221e12eb4a.exe"
    1⤵
    • Checks computer location settings
    • Modifies WinLogon
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      2⤵
      • Modifies registry class
      PID:1924

Network

  • flag-unknown
    DNS
    97.97.242.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.97.242.52.in-addr.arpa
    IN PTR
    Response
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 52.182.143.208:443
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    260 B
    5
  • 40.126.32.133:443
    260 B
    5
  • 93.184.221.240:80
    322 B
    7
  • 8.8.8.8:53
    97.97.242.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.97.242.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3276-132-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3276-133-0x000000006B800000-0x000000006B8F0000-memory.dmp

    Filesize

    960KB

  • memory/3276-146-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.