Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:22 UTC

General

  • Target

    c059a32f921f670c8db1697cda5adf502cb95c8fec8fe3040a5ee647c784c3bd.dll

  • Size

    50KB

  • MD5

    350a1d996529d453fa9defcdc726b40b

  • SHA1

    cd4f2d27824110424dcc7992eb9d74e9155a2720

  • SHA256

    c059a32f921f670c8db1697cda5adf502cb95c8fec8fe3040a5ee647c784c3bd

  • SHA512

    a2b2cdfb61613426cdb9bf6b2530835c2e1afa8f9e3cf44803ad0683eeb405f737f1e8886e655688ff0a906732e91e463b3b6df111af24e36f3cdbb0d2c49ca1

  • SSDEEP

    768:dY3s+AgMsM06FCiqOzDxANKedkqQDL0pxbZoky4vynGA+NeHG/hIq/jA7i5O:jrCiqIDxANKedk5SxOvGAKB9bdk

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c059a32f921f670c8db1697cda5adf502cb95c8fec8fe3040a5ee647c784c3bd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c059a32f921f670c8db1697cda5adf502cb95c8fec8fe3040a5ee647c784c3bd.dll,#1
      2⤵
      • Checks BIOS information in registry
      • Drops startup file
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1560

Network

  • flag-unknown
    DNS
    226.101.242.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    226.101.242.52.in-addr.arpa
    IN PTR
    Response
  • 52.109.8.86:443
    40 B
    1
  • 20.42.65.85:443
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 95.101.78.106:80
    322 B
    7
  • 87.248.202.1:80
    322 B
    7
  • 87.248.202.1:80
    322 B
    7
  • 8.238.21.254:80
    46 B
    40 B
    1
    1
  • 8.8.8.8:53
    226.101.242.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    226.101.242.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1560-133-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/1560-134-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.