Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/06/2023, 15:48 UTC

230602-s8783scg2y 5

Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2023, 15:48 UTC

General

  • Target

    Document Delivery Notice - Order #4343822119542 (41.5 KB).msg

  • Size

    74KB

  • MD5

    ccbaeca7b848269cba33a6d4e1777ecf

  • SHA1

    64a3407782dbaa7902119c0cc04c0ccb6c750c14

  • SHA256

    4f3753c2063e2c77a5d80d46e81e5d9a4a6f53e5fa5904d36c487f20ea9ac2c1

  • SHA512

    6507e32ab79b6d0707254643303d930f55eade053dd6fc6485a6ce799da577fcdaf7352d10a0d44ce865368eba9767b975798d40dcf680741104cead430e81bc

  • SSDEEP

    1536:C1o4VX6XPmNvi017XmQjW1sBpycAGRV6G:C1o4c/mN6o7XJBsP/G

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Document Delivery Notice - Order #4343822119542 (41.5 KB).msg"
    1⤵
    • Modifies registry class
    PID:4028
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2140

Network

  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    232.168.11.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.168.11.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    203.151.224.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    203.151.224.20.in-addr.arpa
    IN PTR
    Response
  • 40.125.122.176:443
    260 B
    5
  • 52.168.112.66:443
    322 B
    7
  • 40.125.122.176:443
    260 B
    5
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 40.125.122.176:443
    260 B
    5
  • 173.223.113.164:443
    322 B
    7
  • 173.223.113.131:80
    322 B
    7
  • 204.79.197.203:80
    322 B
    7
  • 40.125.122.176:443
    260 B
    5
  • 40.125.122.176:443
    260 B
    5
  • 40.125.122.176:443
    208 B
    4
  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    232.168.11.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    232.168.11.51.in-addr.arpa

  • 8.8.8.8:53
    203.151.224.20.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    203.151.224.20.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.