Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2023, 06:26 UTC

General

  • Target

    3488016559f3cc17649b14a8441723d76a54e83883e3b5f6850455588bfe32ca.exe

  • Size

    3.4MB

  • MD5

    7123ba9660904bc686b6fd671bb68320

  • SHA1

    642748e62b22da7d711be1641fbd8834839e4790

  • SHA256

    3488016559f3cc17649b14a8441723d76a54e83883e3b5f6850455588bfe32ca

  • SHA512

    6cd05f0839cac1f78e694c81a59ad9f91cfc3aa8fe025f931f75651515098da187f6723e43dad749a996ec1bc668cf584fc741082015b5fb1c360f1012a61e65

  • SSDEEP

    98304:eMeSg/XlpO7UgCKgSSH4BAJl2QvzI0kO/uDO7UgCKgSSH4BAJlT:fmlhgblSXJIyujgblSXV

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 4 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 3 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3488016559f3cc17649b14a8441723d76a54e83883e3b5f6850455588bfe32ca.exe
    "C:\Users\Admin\AppData\Local\Temp\3488016559f3cc17649b14a8441723d76a54e83883e3b5f6850455588bfe32ca.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\Windows\system32\dm.dll /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:1320

Network

  • flag-us
    DNS
    76.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    76.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.228.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.228.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    41.110.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    41.110.16.96.in-addr.arpa
    IN PTR
    Response
    41.110.16.96.in-addr.arpa
    IN PTR
    a96-16-110-41deploystaticakamaitechnologiescom
  • flag-us
    DNS
    26.35.223.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    26.35.223.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    54.120.234.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    54.120.234.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    103.169.127.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    103.169.127.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    48.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    48.229.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    16.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    16.173.189.20.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    76.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    76.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    9.228.82.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    9.228.82.20.in-addr.arpa

  • 8.8.8.8:53
    41.110.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    41.110.16.96.in-addr.arpa

  • 8.8.8.8:53
    26.35.223.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    26.35.223.20.in-addr.arpa

  • 8.8.8.8:53
    54.120.234.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    54.120.234.20.in-addr.arpa

  • 8.8.8.8:53
    103.169.127.40.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    103.169.127.40.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    48.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    48.229.111.52.in-addr.arpa

  • 8.8.8.8:53
    16.173.189.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    16.173.189.20.in-addr.arpa

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\dm.dll

    Filesize

    821KB

    MD5

    459b11596d6532bbc46f15b371810ab5

    SHA1

    ae66b39e4f5b28cbf2e68cbf90223cec63241a56

    SHA256

    9737b8480c6fb3facd8e5d325477cbe15f0404688b03f47fa2736757b6215d5d

    SHA512

    86fb19a0fcc613b55da0694b5943993d96a3f36e9840e05248cb5dca80b7c553cb5772db1284304944be53ebe84036338ea8ffa83fe65c23a8ec4650ac9435b4

  • C:\Windows\SysWOW64\dm.dll

    Filesize

    821KB

    MD5

    459b11596d6532bbc46f15b371810ab5

    SHA1

    ae66b39e4f5b28cbf2e68cbf90223cec63241a56

    SHA256

    9737b8480c6fb3facd8e5d325477cbe15f0404688b03f47fa2736757b6215d5d

    SHA512

    86fb19a0fcc613b55da0694b5943993d96a3f36e9840e05248cb5dca80b7c553cb5772db1284304944be53ebe84036338ea8ffa83fe65c23a8ec4650ac9435b4

  • C:\Windows\SysWOW64\dm.dll

    Filesize

    821KB

    MD5

    459b11596d6532bbc46f15b371810ab5

    SHA1

    ae66b39e4f5b28cbf2e68cbf90223cec63241a56

    SHA256

    9737b8480c6fb3facd8e5d325477cbe15f0404688b03f47fa2736757b6215d5d

    SHA512

    86fb19a0fcc613b55da0694b5943993d96a3f36e9840e05248cb5dca80b7c553cb5772db1284304944be53ebe84036338ea8ffa83fe65c23a8ec4650ac9435b4

  • C:\Windows\SysWOW64\dm.dll

    Filesize

    821KB

    MD5

    459b11596d6532bbc46f15b371810ab5

    SHA1

    ae66b39e4f5b28cbf2e68cbf90223cec63241a56

    SHA256

    9737b8480c6fb3facd8e5d325477cbe15f0404688b03f47fa2736757b6215d5d

    SHA512

    86fb19a0fcc613b55da0694b5943993d96a3f36e9840e05248cb5dca80b7c553cb5772db1284304944be53ebe84036338ea8ffa83fe65c23a8ec4650ac9435b4

  • memory/1320-3-0x0000000010000000-0x000000001017A000-memory.dmp

    Filesize

    1.5MB

  • memory/1872-5-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/1872-6-0x0000000077590000-0x0000000077680000-memory.dmp

    Filesize

    960KB

  • memory/1872-9-0x0000000003570000-0x00000000036EA000-memory.dmp

    Filesize

    1.5MB

  • memory/1872-10-0x0000000002CA0000-0x0000000002E40000-memory.dmp

    Filesize

    1.6MB

  • memory/1872-11-0x0000000003570000-0x00000000036EA000-memory.dmp

    Filesize

    1.5MB

  • memory/1872-12-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/1872-13-0x0000000077590000-0x0000000077680000-memory.dmp

    Filesize

    960KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.