Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
191s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:55 UTC
Static task
static1
Behavioral task
behavioral1
Sample
9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe
Resource
win10v2004-20230915-en
General
-
Target
9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe
-
Size
10.8MB
-
MD5
6beeea8c8d1e32cda351cdedcf325f49
-
SHA1
53246b8583f2505e75d0c0971bb186524d618ec6
-
SHA256
9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045
-
SHA512
9710887db57ffb50515134880fc6533773b073fddf99f5d0669d631778a53d2df0a7f48551c1e23e6ba8c68e6aaff0f9c586432bf303f9f72693e9a3dbd32f84
-
SSDEEP
196608:riqFfVgjkYWjSiTYDuQTaijGf8TYxMFd+46N+yuXmiNKn8X8q3VcxeX6gq:riG0kYWOk1Q7jGEYxgb1XXYn2wq6l
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4712 9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe 4712 9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe 4712 9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe 4712 9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe
Processes
Network
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request108.211.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.177.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.81.57.23.in-addr.arpaIN PTRResponse29.81.57.23.in-addr.arpaIN PTRa23-57-81-29deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request160.50.123.104.in-addr.arpaIN PTRResponse160.50.123.104.in-addr.arpaIN PTRa104-123-50-160deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesta.0qsf.comIN AResponsea.0qsf.comIN A154.222.224.99
-
Remote address:8.8.8.8:53Requestwww.htdlq.comIN AResponsewww.htdlq.comIN A154.222.224.94
-
GEThttp://www.htdlq.com/bmd.txt9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exeRemote address:154.222.224.94:80RequestGET /bmd.txt HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Language: zh-cn
Referer: http://www.htdlq.com/bmd.txt
User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Host: www.htdlq.com
ResponseHTTP/1.1 200 OK
Last-Modified: Tue, 10 Oct 2023 03:08:25 GMT
Accept-Ranges: bytes
ETag: "1f57eb827fbd91:0"
Server: Microsoft-IIS/10.0
Date: Fri, 13 Oct 2023 19:26:13 GMT
Content-Length: 614
-
Remote address:8.8.8.8:53Request99.224.222.154.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request94.224.222.154.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request168.117.168.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request38.148.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request126.209.247.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
580 B 256 B 8 6
-
154.222.224.94:80http://www.htdlq.com/bmd.txthttp9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exe538 B 1.0kB 7 4
HTTP Request
GET http://www.htdlq.com/bmd.txtHTTP Response
200 -
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
74 B 145 B 1 1
DNS Request
108.211.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
75.159.190.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
254.177.238.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
73.159.190.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
29.81.57.23.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
160.50.123.104.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
a.0qsf.com
DNS Response
154.222.224.99
-
59 B 75 B 1 1
DNS Request
www.htdlq.com
DNS Response
154.222.224.94
-
73 B 134 B 1 1
DNS Request
99.224.222.154.in-addr.arpa
-
73 B 134 B 1 1
DNS Request
94.224.222.154.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
168.117.168.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
38.148.119.40.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
126.209.247.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56e4de6ec069a253d607f235f8be154f9
SHA14008feed1f78dffe8217a8f4eb0ca1d04233d12e
SHA256273ab9325ca89214f1674f957c6d4ce0730db61b6891cef3959bd8be60f7b7ca
SHA512fb20f1f6b85585fe7982a746b65bde7c2754dc91169a23ac57f7b2d6681de0bf34d5eb972417e2da7dc028fa473f20a904642765c72d6551916301009c47a998
-
Filesize
1KB
MD5dff46f7ffe396f09bc7978d4f2784156
SHA1d3847423fd9a34beae449e6ba941109842715159
SHA256c26b55bff01b8a4820c27c7aa87a07208fbf6d782a28ea78f7bd1d3741342284
SHA512dfd9ee630496991fb4b0c266b4f6bbe021666e0d3286c15b678c69057745c869a6e391ebda33c53d7a49539e293935366f193e2fccc78451f88850d6c8f581de
-
C:\Users\Admin\AppData\Local\Temp\9b0152f3a1bc64fe5322db07131ac2a77c03e88e8b9ebb8ba872f74a674da045.exepack.tmp
Filesize2KB
MD5e9007e5f8dbb3e69a35583c2a6002c7c
SHA1455a8830cc9eef1281fe5f897fb2b2d666b94c94
SHA25628e7a8234d6a1c8b673ba57174bf2f406f185b51670f1d2b25a9cd10da44bbac
SHA5128d07b47414debe897de5bc6c4152803236c321d50f486ec4710027f0ae1a54a634d71eb37756025faed58fe4a6c48b5b038b2908756a973928183d990f985768