Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2023, 12:46 UTC

General

  • Target

    https://caioaraujo.vip/CXUUV/ardAbnbIhodickpenis.bin

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://caioaraujo.vip/CXUUV/ardAbnbIhodickpenis.bin
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1912

Network

  • flag-us
    DNS
    caioaraujo.vip
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    caioaraujo.vip
    IN A
    Response
    caioaraujo.vip
    IN A
    188.114.97.0
    caioaraujo.vip
    IN A
    188.114.96.0
  • flag-us
    GET
    https://caioaraujo.vip/CXUUV/ardAbnbIhodickpenis.bin
    IEXPLORE.EXE
    Remote address:
    188.114.97.0:443
    Request
    GET /CXUUV/ardAbnbIhodickpenis.bin HTTP/2.0
    host: caioaraujo.vip
    accept: text/html, application/xhtml+xml, image/jxr, */*
    accept-language: en-US
    user-agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
    accept-encoding: gzip, deflate
    Response
    HTTP/2.0 200
    date: Fri, 30 Jun 2023 13:15:13 GMT
    content-type: application/octet-stream
    content-length: 536576
    last-modified: Mon, 13 Dec 2021 10:11:23 GMT
    cache-control: max-age=14400
    cf-cache-status: HIT
    accept-ranges: bytes
    report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=aYtfD7kTfSe96HCEfjWPQZ5cTK0i7f4BaVxQytc4eQwoQIRmpqcMg0xbFUX3J6V6%2Fq6j92%2FDIOXjY0BYh3u5z6nz4Ai1m%2BcpX2J2FYEbzHT1ulh8%2BVU6zLiaX4MWSeQLkg%3D%3D"}],"group":"cf-nel","max_age":604800}
    nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    vary: Accept-Encoding
    server: cloudflare
    cf-ray: 7df6ad405f5bb903-AMS
    alt-svc: h3=":443"; ma=86400
  • flag-us
    DNS
    0.97.114.188.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.97.114.188.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    x2.c.lencr.org
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    x2.c.lencr.org
    IN A
    Response
    x2.c.lencr.org
    IN CNAME
    crl.root-x1.letsencrypt.org.edgekey.net
    crl.root-x1.letsencrypt.org.edgekey.net
    IN CNAME
    e8652.dscx.akamaiedge.net
    e8652.dscx.akamaiedge.net
    IN A
    23.222.33.142
  • flag-nl
    GET
    http://x2.c.lencr.org/
    IEXPLORE.EXE
    Remote address:
    23.222.33.142:80
    Request
    GET / HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: x2.c.lencr.org
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: application/pkix-crl
    Last-Modified: Sat, 15 Apr 2023 00:28:13 GMT
    ETag: "6439ef9d-12c"
    Cache-Control: max-age=3600
    Expires: Fri, 30 Jun 2023 14:15:13 GMT
    Date: Fri, 30 Jun 2023 13:15:13 GMT
    Content-Length: 300
    Connection: keep-alive
  • flag-us
    DNS
    142.33.222.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    142.33.222.23.in-addr.arpa
    IN PTR
    Response
    142.33.222.23.in-addr.arpa
    IN PTR
    a23-222-33-142deploystaticakamaitechnologiescom
  • flag-us
    DNS
    103.169.127.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    103.169.127.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    161.19.199.152.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    161.19.199.152.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    64.13.109.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    64.13.109.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    72.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    72.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    59.128.231.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    59.128.231.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    2.36.159.162.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    2.36.159.162.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.197.79.204.in-addr.arpa
    IN PTR
    Response
    200.197.79.204.in-addr.arpa
    IN PTR
    a-0001a-msedgenet
  • flag-us
    DNS
    183.59.114.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    183.59.114.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    57.169.31.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.169.31.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    8.9.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.9.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • flag-us
    DNS
    76.121.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    76.121.18.2.in-addr.arpa
    IN PTR
    Response
    76.121.18.2.in-addr.arpa
    IN PTR
    a2-18-121-76deploystaticakamaitechnologiescom
  • flag-us
    DNS
    69.121.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    69.121.18.2.in-addr.arpa
    IN PTR
    Response
    69.121.18.2.in-addr.arpa
    IN PTR
    a2-18-121-69deploystaticakamaitechnologiescom
  • 192.229.221.95:80
    322 B
    7
  • 192.229.221.95:80
    260 B
    5
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    260 B
    5
  • 188.114.97.0:443
    https://caioaraujo.vip/CXUUV/ardAbnbIhodickpenis.bin
    tls, http2
    IEXPLORE.EXE
    20.4kB
    563.0kB
    430
    426

    HTTP Request

    GET https://caioaraujo.vip/CXUUV/ardAbnbIhodickpenis.bin

    HTTP Response

    200
  • 188.114.97.0:443
    caioaraujo.vip
    IEXPLORE.EXE
    156 B
    3
  • 23.222.33.142:80
    http://x2.c.lencr.org/
    http
    IEXPLORE.EXE
    391 B
    761 B
    6
    4

    HTTP Request

    GET http://x2.c.lencr.org/

    HTTP Response

    200
  • 188.114.96.0:443
    caioaraujo.vip
    IEXPLORE.EXE
    156 B
    3
  • 188.114.97.0:443
    caioaraujo.vip
    tls, http2
    IEXPLORE.EXE
    963 B
    483 B
    9
    6
  • 20.189.173.10:443
    322 B
    7
  • 204.79.197.200:443
    ieonline.microsoft.com
    iexplore.exe
    156 B
    3
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls, http2
    iexplore.exe
    1.2kB
    8.0kB
    15
    13
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 8.8.8.8:53
    caioaraujo.vip
    dns
    IEXPLORE.EXE
    60 B
    92 B
    1
    1

    DNS Request

    caioaraujo.vip

    DNS Response

    188.114.97.0
    188.114.96.0

  • 8.8.8.8:53
    0.97.114.188.in-addr.arpa
    dns
    71 B
    133 B
    1
    1

    DNS Request

    0.97.114.188.in-addr.arpa

  • 8.8.8.8:53
    x2.c.lencr.org
    dns
    IEXPLORE.EXE
    60 B
    165 B
    1
    1

    DNS Request

    x2.c.lencr.org

    DNS Response

    23.222.33.142

  • 8.8.8.8:53
    142.33.222.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    142.33.222.23.in-addr.arpa

  • 8.8.8.8:53
    103.169.127.40.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    103.169.127.40.in-addr.arpa

  • 8.8.8.8:53
    161.19.199.152.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    161.19.199.152.in-addr.arpa

  • 8.8.8.8:53
    64.13.109.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    64.13.109.52.in-addr.arpa

  • 8.8.8.8:53
    72.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    72.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    59.128.231.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    59.128.231.4.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    360 B
    5

    DNS Request

    171.39.242.20.in-addr.arpa

    DNS Request

    171.39.242.20.in-addr.arpa

    DNS Request

    171.39.242.20.in-addr.arpa

    DNS Request

    171.39.242.20.in-addr.arpa

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    2.36.159.162.in-addr.arpa
    dns
    71 B
    133 B
    1
    1

    DNS Request

    2.36.159.162.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    200.197.79.204.in-addr.arpa
    dns
    73 B
    106 B
    1
    1

    DNS Request

    200.197.79.204.in-addr.arpa

  • 8.8.8.8:53
    183.59.114.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    183.59.114.20.in-addr.arpa

  • 8.8.8.8:53
    57.169.31.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    57.169.31.20.in-addr.arpa

  • 8.8.8.8:53
    8.9.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    8.9.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa

  • 8.8.8.8:53
    76.121.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    76.121.18.2.in-addr.arpa

  • 8.8.8.8:53
    69.121.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    69.121.18.2.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2K9QMOPD\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.