Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/09/2023, 08:53 UTC

General

  • Target

    2b3309edbf22de898d3fbde8a7f6416abd99b31c364680a32e498d23512f1cac.exe

  • Size

    937KB

  • MD5

    c8623f56dfdb8ceb9460bc79455d1d08

  • SHA1

    e3d3aae075500a7df8f2839bacd71ada439e6019

  • SHA256

    2b3309edbf22de898d3fbde8a7f6416abd99b31c364680a32e498d23512f1cac

  • SHA512

    ab279008eae49c785652b8681283fe297b21fb3941cacf6e089c0b7938fcc4b95bc17c9c0c19c85de77691622b2f081c1a7197155155f15cc271ab4aeda6f1a4

  • SSDEEP

    24576:QyYDf/wwZWaggWTNrJeXs1wCGeWWJpdUpt:XgS9gWJrJeXsmCGGJ8p

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b3309edbf22de898d3fbde8a7f6416abd99b31c364680a32e498d23512f1cac.exe
    "C:\Users\Admin\AppData\Local\Temp\2b3309edbf22de898d3fbde8a7f6416abd99b31c364680a32e498d23512f1cac.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5050682.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5050682.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7399270.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7399270.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7513767.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7513767.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5803156.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5803156.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1108
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4864
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 568
                  7⤵
                  • Program crash
                  PID:3952
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 552
                6⤵
                • Program crash
                PID:4536

    Network

    • flag-us
      DNS
      177.25.221.88.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      177.25.221.88.in-addr.arpa
      IN PTR
      Response
      177.25.221.88.in-addr.arpa
      IN PTR
      a88-221-25-177deploystaticakamaitechnologiescom
    • flag-us
      DNS
      22.236.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      22.236.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      154.141.79.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      154.141.79.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      1.202.248.87.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      1.202.248.87.in-addr.arpa
      IN PTR
      Response
      1.202.248.87.in-addr.arpa
      IN PTR
      https-87-248-202-1amsllnwnet
    No results found
    • 8.8.8.8:53
      177.25.221.88.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      177.25.221.88.in-addr.arpa

    • 8.8.8.8:53
      22.236.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      22.236.111.52.in-addr.arpa

    • 8.8.8.8:53
      154.141.79.40.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      154.141.79.40.in-addr.arpa

    • 8.8.8.8:53
      1.202.248.87.in-addr.arpa
      dns
      71 B
      116 B
      1
      1

      DNS Request

      1.202.248.87.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5050682.exe

      Filesize

      836KB

      MD5

      ec6c59e8d8f32396bad1682dbb030565

      SHA1

      5fd218d30844cf7b72b86bc9bf432db7fb6f5796

      SHA256

      86f41d2f66ee9887b3f22f2e7cbd2034f637c4f13d810574c51449813ca54762

      SHA512

      695d0cae00c85f4e95f64630396c2b12bf2eb09c406f67c654cc9ddcdfae9aa60de84b0b6841c8d33004a7be14b7dbaa858ef5cf7eac8861c15c4bc5cf64c022

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5050682.exe

      Filesize

      836KB

      MD5

      ec6c59e8d8f32396bad1682dbb030565

      SHA1

      5fd218d30844cf7b72b86bc9bf432db7fb6f5796

      SHA256

      86f41d2f66ee9887b3f22f2e7cbd2034f637c4f13d810574c51449813ca54762

      SHA512

      695d0cae00c85f4e95f64630396c2b12bf2eb09c406f67c654cc9ddcdfae9aa60de84b0b6841c8d33004a7be14b7dbaa858ef5cf7eac8861c15c4bc5cf64c022

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7399270.exe

      Filesize

      571KB

      MD5

      8c574b3925a313f55fda82b9ca83be44

      SHA1

      460a5b81009d845d5190a014faea75f47ff57635

      SHA256

      77ad9b6d778b2ac88e0a5bd8e3069729aa8402e28bd445594726aec815421cd1

      SHA512

      3d0ed5e83da88b7205844cfa57378289fec85162c27e851e9a0dd0a4fba463fc984ebd7e42f3038ba851170d57684f551316c97325d716eafbd14a1615c5b00f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7399270.exe

      Filesize

      571KB

      MD5

      8c574b3925a313f55fda82b9ca83be44

      SHA1

      460a5b81009d845d5190a014faea75f47ff57635

      SHA256

      77ad9b6d778b2ac88e0a5bd8e3069729aa8402e28bd445594726aec815421cd1

      SHA512

      3d0ed5e83da88b7205844cfa57378289fec85162c27e851e9a0dd0a4fba463fc984ebd7e42f3038ba851170d57684f551316c97325d716eafbd14a1615c5b00f

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7513767.exe

      Filesize

      394KB

      MD5

      af45258eaf63ca7e2cb7f48c36858fa6

      SHA1

      eb48d80785443cad0fd422473e85b0ee0dc60b9d

      SHA256

      b3b087f98613f348714870c757bc151f955f99417df71830c9bca1eff6462793

      SHA512

      c9ad0bb013cfbe7ae0099b22e834903692996d7fba77937e4e468f49572f9381aea07b5ec621ebb2b7f12339256b9295a89e08aad7ba3f8c0deffa8f22b5de38

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7513767.exe

      Filesize

      394KB

      MD5

      af45258eaf63ca7e2cb7f48c36858fa6

      SHA1

      eb48d80785443cad0fd422473e85b0ee0dc60b9d

      SHA256

      b3b087f98613f348714870c757bc151f955f99417df71830c9bca1eff6462793

      SHA512

      c9ad0bb013cfbe7ae0099b22e834903692996d7fba77937e4e468f49572f9381aea07b5ec621ebb2b7f12339256b9295a89e08aad7ba3f8c0deffa8f22b5de38

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5803156.exe

      Filesize

      365KB

      MD5

      d33a5c95fe857bac11505f515f31b0ec

      SHA1

      6219f73793e80a799a8c7eed69602c15b35b0cd6

      SHA256

      fb2939d621f560d475aed8e7f5e6df092f7bceda7fa79a9d355a9ab2e0c6979c

      SHA512

      78654322a5e991471bb4e68f95a106fde521de0b435ec3852bd42ee2ce2c566bb302b5346449ebd4abedefd583ffb3bb45e874eed7daf12ccb4bc9d3c4be340d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5803156.exe

      Filesize

      365KB

      MD5

      d33a5c95fe857bac11505f515f31b0ec

      SHA1

      6219f73793e80a799a8c7eed69602c15b35b0cd6

      SHA256

      fb2939d621f560d475aed8e7f5e6df092f7bceda7fa79a9d355a9ab2e0c6979c

      SHA512

      78654322a5e991471bb4e68f95a106fde521de0b435ec3852bd42ee2ce2c566bb302b5346449ebd4abedefd583ffb3bb45e874eed7daf12ccb4bc9d3c4be340d

    • memory/4864-28-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4864-31-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4864-32-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/4864-34-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.