Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    287s
  • max time network
    295s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2023, 14:09 UTC

General

  • Target

    503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe

  • Size

    781KB

  • MD5

    12140265e812756acf32e1a81774f77a

  • SHA1

    3616d86bd9e6d4cf51dca68135da81736766f0dd

  • SHA256

    503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34

  • SHA512

    97471ad4b21dc70888bf05c62a1a961216eeba34eaae1b3da54e618561e72ab5288a2490064cf5fd37bb3aa579b9f3f7ca926c90e5ef952bbcaa91f5fe3b9aa9

  • SSDEEP

    12288:vMr2y90qgFFukn/Tm7R8X84BUBZlCa1nhgVhWRdApDW/zR5/XZUranwqUFO:hyLa1/Tm7ROutOPwd5/pU+nwqUQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe
    "C:\Users\Admin\AppData\Local\Temp\503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vct58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vct58.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vta85.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vta85.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dup98.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dup98.exe
          4⤵
          • Executes dropped EXE
          PID:3080

Network

  • flag-us
    DNS
    15.89.54.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.89.54.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    103.169.127.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    103.169.127.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    a.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.5.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    a.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.5.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • 104.80.225.205:443
    322 B
    7
  • 8.8.8.8:53
    15.89.54.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    15.89.54.20.in-addr.arpa

  • 8.8.8.8:53
    103.169.127.40.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    103.169.127.40.in-addr.arpa

  • 8.8.8.8:53
    a.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.5.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    a.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.5.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vct58.exe

    Filesize

    677KB

    MD5

    91c9623a9d02ecc37e33aefcb1a64342

    SHA1

    87fc3a0fd8189b61561cddaa049b0e18a5c9d40e

    SHA256

    5eb0f19aca288acb444faf17502974f8a16254f2a2754933c6410dcd43325155

    SHA512

    2514145ced516a401b38a269bee481b1179b2add3eda7a3e51e08f55ffd51c81ab0000d5afa26f162537eb52d79518224b1d05e95ad6e1025370163ca7295b70

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vct58.exe

    Filesize

    677KB

    MD5

    91c9623a9d02ecc37e33aefcb1a64342

    SHA1

    87fc3a0fd8189b61561cddaa049b0e18a5c9d40e

    SHA256

    5eb0f19aca288acb444faf17502974f8a16254f2a2754933c6410dcd43325155

    SHA512

    2514145ced516a401b38a269bee481b1179b2add3eda7a3e51e08f55ffd51c81ab0000d5afa26f162537eb52d79518224b1d05e95ad6e1025370163ca7295b70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vta85.exe

    Filesize

    532KB

    MD5

    ff1c65618d9eccd12e4671edc6aefa68

    SHA1

    b67e2b1740374bb39f21d3bb2c5dfbb0250414e5

    SHA256

    a98cef5fd8791f82f547d75ed3bd5de1f5a4bd3398801928e28b565c274cdaf0

    SHA512

    3c2b03d4c071283fe92ab212b3d19f4a23bb397b9f008d7960ac9048653c1952bb8f6e0eec65ac10ababdcdd0b226f8946cd09c2ab37260236878bb4d802bc45

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vta85.exe

    Filesize

    532KB

    MD5

    ff1c65618d9eccd12e4671edc6aefa68

    SHA1

    b67e2b1740374bb39f21d3bb2c5dfbb0250414e5

    SHA256

    a98cef5fd8791f82f547d75ed3bd5de1f5a4bd3398801928e28b565c274cdaf0

    SHA512

    3c2b03d4c071283fe92ab212b3d19f4a23bb397b9f008d7960ac9048653c1952bb8f6e0eec65ac10ababdcdd0b226f8946cd09c2ab37260236878bb4d802bc45

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dup98.exe

    Filesize

    338KB

    MD5

    cb2d93db92499f0d807e5de936216415

    SHA1

    6599f128b4914dfa7085a114f765f28ab2383366

    SHA256

    8b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6

    SHA512

    af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dup98.exe

    Filesize

    338KB

    MD5

    cb2d93db92499f0d807e5de936216415

    SHA1

    6599f128b4914dfa7085a114f765f28ab2383366

    SHA256

    8b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6

    SHA512

    af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66

  • memory/3080-141-0x0000000000AE3000-0x0000000000B12000-memory.dmp

    Filesize

    188KB

  • memory/3080-142-0x00000000008D0000-0x000000000091B000-memory.dmp

    Filesize

    300KB

  • memory/3080-143-0x0000000000AE3000-0x0000000000B12000-memory.dmp

    Filesize

    188KB

  • memory/3080-144-0x0000000000400000-0x00000000007B1000-memory.dmp

    Filesize

    3.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.