Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 22:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
99b64fb5afa891594926f40154df1cf5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
99b64fb5afa891594926f40154df1cf5.exe
Resource
win10v2004-20230831-en
General
-
Target
99b64fb5afa891594926f40154df1cf5.exe
-
Size
2.3MB
-
MD5
99b64fb5afa891594926f40154df1cf5
-
SHA1
8f0361a9a69d166e36a58cfbc30ac237107b95a9
-
SHA256
ecb9d6e6bd48f11c73f03c7fa605449eb2828dac1605069b1abc94f6e915dcde
-
SHA512
d3057a4069a7c42968c995ddf17c95a7487aab6e73a380d96da637b33831f5083d359a76a6dfd9ed2f5ced29d02e4c6dc1c0e65ef84b679e70f1b9806c546437
-
SSDEEP
49152:acbz6i3uwY1/PHXL0yx8TRv5c/Y8kHlsTg+Y7zKSLpCdLWL1:acbVuw0/ws89Rc/Y8oCg+OzNLpWLQ1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation 99b64fb5afa891594926f40154df1cf5.exe -
Loads dropped DLL 2 IoCs
pid Process 4948 rundll32.exe 3956 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000_Classes\Local Settings 99b64fb5afa891594926f40154df1cf5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2916 1060 99b64fb5afa891594926f40154df1cf5.exe 85 PID 1060 wrote to memory of 2916 1060 99b64fb5afa891594926f40154df1cf5.exe 85 PID 1060 wrote to memory of 2916 1060 99b64fb5afa891594926f40154df1cf5.exe 85 PID 2916 wrote to memory of 4948 2916 control.exe 87 PID 2916 wrote to memory of 4948 2916 control.exe 87 PID 2916 wrote to memory of 4948 2916 control.exe 87 PID 4948 wrote to memory of 2228 4948 rundll32.exe 90 PID 4948 wrote to memory of 2228 4948 rundll32.exe 90 PID 2228 wrote to memory of 3956 2228 RunDll32.exe 91 PID 2228 wrote to memory of 3956 2228 RunDll32.exe 91 PID 2228 wrote to memory of 3956 2228 RunDll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\99b64fb5afa891594926f40154df1cf5.exe"C:\Users\Admin\AppData\Local\Temp\99b64fb5afa891594926f40154df1cf5.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",5⤵
- Loads dropped DLL
PID:3956
-
-
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request23.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.3.197.209.in-addr.arpaIN PTRResponse8.3.197.209.in-addr.arpaIN PTRvip0x008map2sslhwcdnnet
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.173.189.20.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
70 B 111 B 1 1
DNS Request
8.3.197.209.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
15.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40