Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3HotkeyControl.dll
windows7-x64
1HotkeyControl.dll
windows10-2004-x64
1SimpleSoundPlayer.exe
windows7-x64
1SimpleSoundPlayer.exe
windows10-2004-x64
3ikpFlac.dll
windows7-x64
1ikpFlac.dll
windows10-2004-x64
1ikpMP3.dll
windows7-x64
1ikpMP3.dll
windows10-2004-x64
1irrKlang.NET4.dll
windows7-x64
1irrKlang.NET4.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2023, 15:28 UTC
Static task
static1
Behavioral task
behavioral1
Sample
HotkeyControl.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
HotkeyControl.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
SimpleSoundPlayer.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
SimpleSoundPlayer.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
ikpFlac.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
ikpFlac.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
ikpMP3.dll
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
ikpMP3.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
irrKlang.NET4.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
irrKlang.NET4.dll
Resource
win10v2004-20230703-en
General
-
Target
irrKlang.NET4.dll
-
Size
490KB
-
MD5
ac0b6db031b4d88249f08d3650be9689
-
SHA1
cc54333d6bea758aac973eb2fdcb89c15ba20611
-
SHA256
c8bc680a6d599d7981d7566118d3d8195aa8dd66fdd9419e1869adbeb1132e05
-
SHA512
085f09580c2b0186d252838865a059b019dbf806c85b2ec78969cd568a0aa11518c9d91f6392f345c270a05617457c37042d24083e973fe7c09bdc33d2797b9b
-
SSDEEP
6144:4rZDB3AZ7yTNXDD4mQs19LbBXVtNF7R+E84F7IXo+ApnNKGekmnjOfY8R0G62B:4rZmINXP4mQs3184hI43pNKGekvO2
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2448 wrote to memory of 4356 2448 rundll32.exe 85 PID 2448 wrote to memory of 4356 2448 rundll32.exe 85 PID 2448 wrote to memory of 4356 2448 rundll32.exe 85
Processes
Network
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request126.210.247.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request204.45.123.104.in-addr.arpaIN PTRResponse204.45.123.104.in-addr.arpaIN PTRa104-123-45-204deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.169.241.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request192.98.74.40.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
20.160.190.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
126.210.247.8.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
204.45.123.104.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
254.169.241.8.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
192.98.74.40.in-addr.arpa