Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 08:19 UTC
Behavioral task
behavioral1
Sample
ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe
Resource
win10v2004-20230703-en
General
-
Target
ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe
-
Size
4.9MB
-
MD5
e3c1078e71cea009051e317ae1018802
-
SHA1
8d90f57b26abce7908a996d9478d555250c417e1
-
SHA256
ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc
-
SHA512
69f788985fb2738e149b38f46c8ecd931f521f073e3bca8856bb464c9eddb299c394b03630de256b122187e5d6a6d27d7e406298c9f3b4365f7415911d28198b
-
SSDEEP
98304:PwmjyTMnYvx4NMaD9Sf8KBcd1WTPY+7rG4+rqFPVRHOG1EN9kg37dT4Gi3y6bDzk:oxb5AOSwGrqF/HDY9kg6Gii6b
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2028-0-0x0000000000400000-0x0000000000B4F000-memory.dmp upx behavioral2/memory/2028-7839-0x0000000000400000-0x0000000000B4F000-memory.dmp upx behavioral2/memory/2028-7841-0x0000000000400000-0x0000000000B4F000-memory.dmp upx behavioral2/memory/2028-13071-0x0000000000400000-0x0000000000B4F000-memory.dmp upx behavioral2/memory/2028-13072-0x0000000000400000-0x0000000000B4F000-memory.dmp upx behavioral2/memory/2028-13080-0x00000000034F0000-0x00000000034FB000-memory.dmp upx behavioral2/memory/2028-13079-0x00000000034F0000-0x00000000034FB000-memory.dmp upx behavioral2/memory/2028-13086-0x00000000034F0000-0x00000000034FB000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\0306D2.dll ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
pid Process 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?28879" ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Internet Explorer\Main ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?28879" ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe 2028 ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe"C:\Users\Admin\AppData\Local\Temp\ce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028
Network
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request126.132.255.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request67.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.57.101.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestsp.kulove123.comIN AResponsesp.kulove123.comIN CNAMEiduxxob.qiniudns.comiduxxob.qiniudns.comIN CNAMEtinyglobalcdnweb.qiniu.com.w.kunlunar.comtinyglobalcdnweb.qiniu.com.w.kunlunar.comIN A47.246.48.211
-
GEThttp://sp.kulove123.com/NIP.datce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exeRemote address:47.246.48.211:80RequestGET /NIP.dat HTTP/1.1
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Host: sp.kulove123.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Type: application/x-ns-proxy-autoconfig
Content-Length: 170
Connection: keep-alive
Date: Tue, 01 Aug 2023 05:24:41 GMT
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Access-Control-Expose-Headers: X-Log, X-Reqid
Access-Control-Max-Age: 2592000
Cache-Control: public, max-age=31536000
Content-Disposition: inline; filename="NIP.dat"; filename*=utf-8''NIP.dat
Content-Md5: ADX5KYeMWmIU80NS8O1BOw==
Content-Transfer-Encoding: binary
Etag: "FsVKpzoq4CAm1gg1Bz2UUF2Y2Auf"
Last-Modified: Tue, 24 Mar 2020 16:29:59 GMT
X-Log: X-Log
X-M-Log: QNM:xs444;QNM3
X-M-Reqid: 4C0AACywYvMDK3cX
X-Qiniu-Zone: 0
X-Qnm-Cache: Hit
X-Reqid: 9R8AAADx_C9VJHYX
X-Svr: IO
Ali-Swift-Global-Savetime: 1690867481
Via: cache2.l2de2[0,46,206-0,H], cache12.l2de2[49,0], cache8.nl2[0,0,200-0,H], cache8.nl2[6,0]
Age: 2343330
X-Cache: HIT TCP_MEM_HIT dirn:1:170180274
X-Swift-SaveTime: Mon, 21 Aug 2023 23:39:17 GMT
X-Swift-CacheTime: 798324
Timing-Allow-Origin: *
EagleId: 2ff6309c16932108114126984e
-
GEThttp://sp.kulove123.com/yzxy.txtce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exeRemote address:47.246.48.211:80RequestGET /yzxy.txt HTTP/1.1
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Host: sp.kulove123.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 1
Connection: keep-alive
Date: Sat, 19 Aug 2023 06:59:09 GMT
Cache-Control: public, max-age=31536000
Etag: "FrZYn8arDcgs8SCZ0cLUCrmU6EEM"
X-M-Log: QNM:xs1186;QNM3/304
X-M-Reqid: rm4AAHwpnAaetnwX
X-Qnm-Cache: Hit
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Access-Control-Expose-Headers: X-Log, X-Reqid
Access-Control-Max-Age: 2592000
Content-Disposition: inline; filename="yzxy.txt"; filename*=utf-8''yzxy.txt
Content-Transfer-Encoding: binary
Last-Modified: Thu, 02 Feb 2017 07:30:37 GMT
Vary: Accept-Encoding
X-Log: X-Log
X-Qiniu-Zone: 0
X-Reqid: XXEAAAC5Mvbwt2UX
X-Svr: IO
Ali-Swift-Global-Savetime: 1692428349
Via: cache4.l2de2[0,0,206-0,H], cache20.l2de2[2,0], cache8.nl2[0,0,200-0,H], cache8.nl2[1,0]
Age: 782463
X-Cache: HIT TCP_MEM_HIT dirn:11:297104592
X-Swift-SaveTime: Mon, 21 Aug 2023 23:39:20 GMT
X-Swift-CacheTime: 2359189
Timing-Allow-Origin: *
EagleId: 2ff6309c16932108121171154e
-
Remote address:8.8.8.8:53Requestcs.kulove123.comIN AResponsecs.kulove123.comIN A47.93.205.92
-
Remote address:8.8.8.8:53Requestcs.kulove123.comIN AResponsecs.kulove123.comIN A47.93.205.92
-
POSThttp://cs.kulove123.com/mtmd-v5.phpce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exeRemote address:47.93.205.92:80RequestPOST /mtmd-v5.php HTTP/1.1
Accept: */*
Accept-Language: zh-CN
User-Agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us)
Content-Type: application/x-www-form-urlencoded
Connection: Keep-Alive
Cache-Control: no-cache
Accept-Encoding: gzip, deflate
Host: cs.kulove123.com
Content-Length: 23
ResponseHTTP/1.1 200 OK
Date: Mon, 28 Aug 2023 08:20:12 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Set-Cookie: PHPSESSID=op86be0mc6j6nfoofbrgr3v6a6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Encoding: gzip
-
POSThttp://cs.kulove123.com/mtmd-v5.phpce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exeRemote address:47.93.205.92:80RequestPOST /mtmd-v5.php HTTP/1.1
Accept: */*
Accept-Language: zh-CN
User-Agent: Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us)
Content-Type: application/x-www-form-urlencoded
Connection: Keep-Alive
Cache-Control: no-cache
Accept-Encoding: gzip, deflate
Host: cs.kulove123.com
Content-Length: 61
Cookie: PHPSESSID=op86be0mc6j6nfoofbrgr3v6a6
ResponseHTTP/1.1 200 OK
Date: Mon, 28 Aug 2023 08:20:13 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Encoding: gzip
-
Remote address:8.8.8.8:53Request211.48.246.47.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request92.205.93.47.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.173.189.20.in-addr.arpaIN PTRResponse
-
47.246.48.211:80http://sp.kulove123.com/yzxy.txthttpce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe665 B 2.4kB 8 5
HTTP Request
GET http://sp.kulove123.com/NIP.datHTTP Response
200HTTP Request
GET http://sp.kulove123.com/yzxy.txtHTTP Response
200 -
47.93.205.92:80http://cs.kulove123.com/mtmd-v5.phphttpce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe1.4kB 4.1kB 13 11
HTTP Request
POST http://cs.kulove123.com/mtmd-v5.phpHTTP Response
200HTTP Request
POST http://cs.kulove123.com/mtmd-v5.phpHTTP Response
200
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
126.132.255.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
67.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.57.101.20.in-addr.arpa
-
8.8.8.8:53sp.kulove123.comdnsce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe62 B 161 B 1 1
DNS Request
sp.kulove123.com
DNS Response
47.246.48.211
-
8.8.8.8:53cs.kulove123.comdnsce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe62 B 78 B 1 1
DNS Request
cs.kulove123.com
DNS Response
47.93.205.92
-
8.8.8.8:53cs.kulove123.comdnsce2963d9e032c8bec72da8ac172cd0059938af3f194471c38728ef9bd214afbc.exe62 B 78 B 1 1
DNS Request
cs.kulove123.com
DNS Response
47.93.205.92
-
72 B 143 B 1 1
DNS Request
211.48.246.47.in-addr.arpa
-
71 B 142 B 1 1
DNS Request
92.205.93.47.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
9.173.189.20.in-addr.arpa