Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2023, 14:00

General

  • Target

    33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe

  • Size

    1.8MB

  • MD5

    93d72e8488c9e0d46eafbc0c4e4d587b

  • SHA1

    4cff0799e86f0f0bdfe2679fffa348c318be8e0d

  • SHA256

    33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a

  • SHA512

    74b01081326194c9f95bd69ff777e6df6ca9cfcf9e4e6f65fb8ba62a7d542ce7a9d21da5e791bf2430d4524d3afb35a55026e384cc6543c8fafe25b976d3fa73

  • SSDEEP

    49152:3yy5PZx+dW5BvZelG955YIby5+K+VcvUU:B5SdWDvZel05Lbykfuv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe
    "C:\Users\Admin\AppData\Local\Temp\33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    744.8MB

    MD5

    768bf515685ca0420a4a2c7e4aa62e37

    SHA1

    f6d380b1311561033a927d5336eb744e6aba9733

    SHA256

    a27aaa02ea6ffa4c2928502adf5a1cd01418b76752a55d80d77688afbdae488a

    SHA512

    6c5c8e7b896c66cfc228d7dec09f352938aaa36fa90cabae88a23b11a7103bb6918a4fb62692ab68c8102d639ab318bb061a8b1dce4b55d3c31f27e55170edf0

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    744.8MB

    MD5

    768bf515685ca0420a4a2c7e4aa62e37

    SHA1

    f6d380b1311561033a927d5336eb744e6aba9733

    SHA256

    a27aaa02ea6ffa4c2928502adf5a1cd01418b76752a55d80d77688afbdae488a

    SHA512

    6c5c8e7b896c66cfc228d7dec09f352938aaa36fa90cabae88a23b11a7103bb6918a4fb62692ab68c8102d639ab318bb061a8b1dce4b55d3c31f27e55170edf0

  • memory/480-139-0x00000000025B1000-0x000000000275B000-memory.dmp

    Filesize

    1.7MB

  • memory/480-140-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/480-141-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/2496-132-0x00000000025FC000-0x00000000027A6000-memory.dmp

    Filesize

    1.7MB

  • memory/2496-133-0x00000000027B0000-0x0000000002B80000-memory.dmp

    Filesize

    3.8MB

  • memory/2496-134-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/2496-138-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB