Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 14:17 UTC

General

  • Target

    d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe

  • Size

    25KB

  • MD5

    ac7849de3120a3ddb72af08bd426a8bd

  • SHA1

    904eb51be8d1bf8e4b7df4bcb623676fe9fa113e

  • SHA256

    d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587

  • SHA512

    301ffd3a4b2696df8ca9b43929438e5b74c73fcce52122046b5fe693c71ad8332d379f294a0075254ca68d144cd64bf4cffcd2ec2e26fd75345fa6ba6f70f291

  • SSDEEP

    384:tlT/W+52Y+nyDGJp7oFtwcp/mDpQjlp0huQSNyPVbkTtnJWAEJc3ziJ:tlTf8Y+yiJp7oQkK28VghJWAEC38

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe
    "C:\Users\Admin\AppData\Local\Temp\d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4944
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        PID:2556
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
        3⤵
        • Modifies Internet Explorer settings
        PID:5016
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
        3⤵
        • Modifies Internet Explorer settings
        PID:4528
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_zh.bat
      2⤵
        PID:1392

    Network

    • flag-unknown
      DNS
      u.9lwan.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      u.9lwan.com
      IN A
      Response
    • flag-unknown
      DNS
      u.9lwan.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      u.9lwan.com
      IN A
      Response
    • flag-unknown
      DNS
      226.101.242.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      226.101.242.52.in-addr.arpa
      IN PTR
      Response
    • flag-unknown
      DNS
      0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
      Remote address:
      8.8.8.8:53
      Request
      0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
      IN PTR
      Response
    • 93.184.221.240:80
      260 B
      5
    • 93.184.220.29:80
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 104.80.225.205:443
      322 B
      7
    • 93.184.220.29:80
      IEXPLORE.EXE
      260 B
      5
    • 204.79.197.200:443
      ieonline.microsoft.com
      IEXPLORE.EXE
      156 B
      3
    • 204.79.197.200:443
      ieonline.microsoft.com
      IEXPLORE.EXE
      156 B
      3
    • 93.184.220.29:80
      IEXPLORE.EXE
      260 B
      5
    • 93.184.221.240:80
      322 B
      7
    • 20.189.173.2:443
      184 B
      4
    • 8.8.8.8:53
      u.9lwan.com
      dns
      IEXPLORE.EXE
      57 B
      118 B
      1
      1

      DNS Request

      u.9lwan.com

    • 8.8.8.8:53
      u.9lwan.com
      dns
      IEXPLORE.EXE
      57 B
      118 B
      1
      1

      DNS Request

      u.9lwan.com

    • 8.8.8.8:53
      226.101.242.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      226.101.242.52.in-addr.arpa

    • 8.8.8.8:53
      0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
      dns
      118 B
      204 B
      1
      1

      DNS Request

      0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_zh.bat

      Filesize

      248B

      MD5

      f4550899a106e7b10b4365ac6231308f

      SHA1

      c6a1482896918945e43f11eb29fc7a26649dd3b5

      SHA256

      03c2e0514b45d4e7cb5d18b32e8e2e14072c37d2074e3d6f6dbd766c1ebffdf7

      SHA512

      622cdf7732b8288fecff0128669bc090a7b6695a4e2a18aa4b69a23c4c47a8675c29710c9fc6eb373140a86e131e6d77413deac887f3a3e8b390ee566ac121f2

    • C:\Windows\SysWOW64\tarpurd32.dll

      Filesize

      44KB

      MD5

      314820a6faa4adb2a3a7c010cbecf373

      SHA1

      0822004226f7b4faf64c1fda9eeb8f43840baeec

      SHA256

      a88ed841f678b1f6d3aec197ca9b3b909bd5c03fab7b48b2217d7249419175c6

      SHA512

      4354745bc3e00b0906dc3902edff9cab332e45c087ac4e0a9f5a5b164e520932ef430ce9b1d340b66131963d6dc945defcf5aaeda1f75ffb92a6cf6ea78189e0

    • memory/4172-132-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4172-137-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.