Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 22:53 UTC

General

  • Target

    99b64fb5afa891594926f40154df1cf5.exe

  • Size

    2.3MB

  • MD5

    99b64fb5afa891594926f40154df1cf5

  • SHA1

    8f0361a9a69d166e36a58cfbc30ac237107b95a9

  • SHA256

    ecb9d6e6bd48f11c73f03c7fa605449eb2828dac1605069b1abc94f6e915dcde

  • SHA512

    d3057a4069a7c42968c995ddf17c95a7487aab6e73a380d96da637b33831f5083d359a76a6dfd9ed2f5ced29d02e4c6dc1c0e65ef84b679e70f1b9806c546437

  • SSDEEP

    49152:acbz6i3uwY1/PHXL0yx8TRv5c/Y8kHlsTg+Y7zKSLpCdLWL1:acbVuw0/ws89Rc/Y8oCg+OzNLpWLQ1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99b64fb5afa891594926f40154df1cf5.exe
    "C:\Users\Admin\AppData\Local\Temp\99b64fb5afa891594926f40154df1cf5.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",
            5⤵
            • Loads dropped DLL
            PID:3956

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    23.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.154.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.154.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    41.110.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    41.110.16.96.in-addr.arpa
    IN PTR
    Response
    41.110.16.96.in-addr.arpa
    IN PTR
    a96-16-110-41deploystaticakamaitechnologiescom
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    183.59.114.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    183.59.114.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    8.3.197.209.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.3.197.209.in-addr.arpa
    IN PTR
    Response
    8.3.197.209.in-addr.arpa
    IN PTR
    vip0x008map2sslhwcdnnet
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.173.189.20.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    23.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    23.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    241.154.82.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.154.82.20.in-addr.arpa

  • 8.8.8.8:53
    41.110.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    41.110.16.96.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    183.59.114.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    183.59.114.20.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    8.3.197.209.in-addr.arpa
    dns
    70 B
    111 B
    1
    1

    DNS Request

    8.3.197.209.in-addr.arpa

  • 8.8.8.8:53
    43.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    43.229.111.52.in-addr.arpa

  • 8.8.8.8:53
    15.173.189.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    15.173.189.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IJdB.cpl

    Filesize

    2.1MB

    MD5

    f79ad2db96c20db2a18eb4692c50c108

    SHA1

    c81b568e6950cc0d1da12ce07851dcb0aa09141b

    SHA256

    a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634

    SHA512

    e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40

  • C:\Users\Admin\AppData\Local\Temp\IJdB.cpl

    Filesize

    2.1MB

    MD5

    f79ad2db96c20db2a18eb4692c50c108

    SHA1

    c81b568e6950cc0d1da12ce07851dcb0aa09141b

    SHA256

    a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634

    SHA512

    e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40

  • C:\Users\Admin\AppData\Local\Temp\IJdB.cpl

    Filesize

    2.1MB

    MD5

    f79ad2db96c20db2a18eb4692c50c108

    SHA1

    c81b568e6950cc0d1da12ce07851dcb0aa09141b

    SHA256

    a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634

    SHA512

    e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40

  • C:\Users\Admin\AppData\Local\Temp\IJdB.cpl

    Filesize

    2.1MB

    MD5

    f79ad2db96c20db2a18eb4692c50c108

    SHA1

    c81b568e6950cc0d1da12ce07851dcb0aa09141b

    SHA256

    a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634

    SHA512

    e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40

  • memory/3956-31-0x0000000003570000-0x0000000003661000-memory.dmp

    Filesize

    964KB

  • memory/3956-30-0x0000000003570000-0x0000000003661000-memory.dmp

    Filesize

    964KB

  • memory/3956-27-0x0000000003570000-0x0000000003661000-memory.dmp

    Filesize

    964KB

  • memory/3956-26-0x0000000003460000-0x000000000356C000-memory.dmp

    Filesize

    1.0MB

  • memory/3956-22-0x0000000002D90000-0x0000000002D96000-memory.dmp

    Filesize

    24KB

  • memory/4948-11-0x0000000002CC0000-0x0000000002CC6000-memory.dmp

    Filesize

    24KB

  • memory/4948-20-0x0000000002F20000-0x0000000003011000-memory.dmp

    Filesize

    964KB

  • memory/4948-19-0x0000000002F20000-0x0000000003011000-memory.dmp

    Filesize

    964KB

  • memory/4948-16-0x0000000002F20000-0x0000000003011000-memory.dmp

    Filesize

    964KB

  • memory/4948-15-0x0000000002E00000-0x0000000002F0C000-memory.dmp

    Filesize

    1.0MB

  • memory/4948-12-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.