Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 13:07 UTC

General

  • Target

    862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe

  • Size

    606KB

  • MD5

    0acb3172631f0161d0f1504e44d922df

  • SHA1

    a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

  • SHA256

    862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

  • SHA512

    c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

  • SSDEEP

    1536:xzWu+k+UHW8QkHnmpSbUhhFJrDnhH//pSzrcU:CUFISbUhhFJrDhH/BuI

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe
    "C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe
      "C:\Users\Admin\AppData\Local\Temp\862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Users\Admin\AppData\Roaming\94e8296\94e8296.exe
        "C:\Users\Admin\AppData\Roaming\94e8296\94e8296.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Users\Admin\AppData\Roaming\94e8296\94e8296.exe
          "C:\Users\Admin\AppData\Roaming\94e8296\94e8296.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Windows\syswow64\explorer.exe
            "C:\Windows\syswow64\explorer.exe"
            5⤵
              PID:1960

    Network

    • flag-unknown
      DNS
      ad.amneplay.com
      explorer.exe
      Remote address:
      8.8.8.8:53
      Request
      ad.amneplay.com
      IN A
      Response
    • flag-unknown
      DNS
      ad.tool2ago.com
      explorer.exe
      Remote address:
      8.8.8.8:53
      Request
      ad.tool2ago.com
      IN A
      Response
    No results found
    • 8.8.8.8:53
      ad.amneplay.com
      dns
      explorer.exe
      61 B
      134 B
      1
      1

      DNS Request

      ad.amneplay.com

    • 8.8.8.8:53
      ad.tool2ago.com
      dns
      explorer.exe
      61 B
      134 B
      1
      1

      DNS Request

      ad.tool2ago.com

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\94e8296\94e8296.exe

      Filesize

      606KB

      MD5

      0acb3172631f0161d0f1504e44d922df

      SHA1

      a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

      SHA256

      862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

      SHA512

      c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

    • C:\Users\Admin\AppData\Roaming\94e8296\94e8296.exe

      Filesize

      606KB

      MD5

      0acb3172631f0161d0f1504e44d922df

      SHA1

      a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

      SHA256

      862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

      SHA512

      c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

    • C:\Users\Admin\AppData\Roaming\94e8296\94e8296.exe

      Filesize

      606KB

      MD5

      0acb3172631f0161d0f1504e44d922df

      SHA1

      a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

      SHA256

      862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

      SHA512

      c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

    • \Users\Admin\AppData\Roaming\94e8296\94e8296.exe

      Filesize

      606KB

      MD5

      0acb3172631f0161d0f1504e44d922df

      SHA1

      a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

      SHA256

      862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

      SHA512

      c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

    • \Users\Admin\AppData\Roaming\94e8296\94e8296.exe

      Filesize

      606KB

      MD5

      0acb3172631f0161d0f1504e44d922df

      SHA1

      a3ca1d6f2c67ca15ff6ae0b594a909fec14d6f42

      SHA256

      862e7759b4b7a6d53e5e0187e084ec6228fc1c4d69c0843ccaf14517a6a7be3c

      SHA512

      c1e59d8293bd7faf69e2add8e8b97393060b2d7b3f0b57923d27a0050fc33fff8e97888c5f3167893b1d0e9a27f13eee491b1748234d2082c25b9de38aff3a95

    • memory/1088-91-0x0000000001EB0000-0x0000000002031000-memory.dmp

      Filesize

      1.5MB

    • memory/1088-97-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1088-92-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1128-93-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1128-75-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1584-54-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1584-69-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1772-68-0x0000000002050000-0x00000000021D1000-memory.dmp

      Filesize

      1.5MB

    • memory/1772-56-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1772-62-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1772-60-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1772-63-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1772-58-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1772-74-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1772-67-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1772-66-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

      Filesize

      8KB

    • memory/1772-55-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1960-99-0x00000000747F1000-0x00000000747F3000-memory.dmp

      Filesize

      8KB

    • memory/1960-100-0x0000000000080000-0x000000000008C000-memory.dmp

      Filesize

      48KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.