Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 19:47 UTC

General

  • Target

    d4241664d57cbee73958005d2d30d510_exe32.exe

  • Size

    60KB

  • MD5

    d4241664d57cbee73958005d2d30d510

  • SHA1

    0122431ddf292c8c8d3ec6bc7799f90aeb33f836

  • SHA256

    96fef3c78f78f180669bdd741be26e6c0a3acb039e6a4235110fc498ad0804e4

  • SHA512

    5cce198150b95fa68f71543837fccfaedee43b3c620fd1f32b797cb7837c88d7499cbecc4a182ad5c0622c4f8d484c957a38fbc2a93c10fd93024c4a4d2d35a3

  • SSDEEP

    1536:Itka3G9MXSRa+ycuCRo0oxNqIxSupVvIZ:Qka29MXZxIZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4241664d57cbee73958005d2d30d510_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\d4241664d57cbee73958005d2d30d510_exe32.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\bijaweed.exe
      C:\Users\Admin\AppData\Local\Temp\bijaweed.exe
      2⤵
      • Executes dropped EXE
      PID:2368

Network

  • flag-us
    DNS
    icanhazip.com
    bijaweed.exe
    Remote address:
    8.8.8.8:53
    Request
    icanhazip.com
    IN A
    Response
    icanhazip.com
    IN A
    104.18.115.97
    icanhazip.com
    IN A
    104.18.114.97
  • flag-us
    GET
    http://icanhazip.com/
    bijaweed.exe
    Remote address:
    104.18.115.97:80
    Request
    GET / HTTP/1.1
    Accept: text/*, application/*
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Firefox/38.0
    Host: icanhazip.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Mon, 16 Oct 2023 00:50:20 GMT
    Content-Type: text/plain
    Content-Length: 13
    Connection: keep-alive
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET
    Set-Cookie: __cf_bm=7IMw0lmi1hT07zOab3ycglmKbi4JK4r_vSOzQGYhh5U-1697417420-0-AYtA3cwxxCYW0Eq2wiyBpD78FuA9fvVtPg/76Lm/2x8hId6VfYW3hBPLxgi0ZIS35n/VpwopTt++SAzQr3wpAbA=; path=/; expires=Mon, 16-Oct-23 01:20:20 GMT; domain=.icanhazip.com; HttpOnly; SameSite=None
    Server: cloudflare
    CF-RAY: 816c4e9e5cf20e44-AMS
    alt-svc: h3=":443"; ma=86400
  • 104.18.115.97:80
    http://icanhazip.com/
    http
    bijaweed.exe
    463 B
    1.3kB
    6
    5

    HTTP Request

    GET http://icanhazip.com/

    HTTP Response

    200
  • 188.120.194.101:13140
    bijaweed.exe
    104 B
    2
  • 208.123.130.173:443
    bijaweed.exe
    152 B
    3
  • 208.123.130.173:443
    bijaweed.exe
    152 B
    3
  • 208.123.130.173:443
    bijaweed.exe
    152 B
    3
  • 208.123.130.173:443
    bijaweed.exe
    152 B
    3
  • 178.214.221.89:443
    bijaweed.exe
    152 B
    3
  • 178.214.221.89:443
    bijaweed.exe
    104 B
    2
  • 8.8.8.8:53
    icanhazip.com
    dns
    bijaweed.exe
    59 B
    91 B
    1
    1

    DNS Request

    icanhazip.com

    DNS Response

    104.18.115.97
    104.18.114.97

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bijaweed.exe

    Filesize

    60KB

    MD5

    82d96254aa987cb34f5678b31e8f8220

    SHA1

    75a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a

    SHA256

    4f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531

    SHA512

    7ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252

  • C:\Users\Admin\AppData\Local\Temp\bijaweed.exe

    Filesize

    60KB

    MD5

    82d96254aa987cb34f5678b31e8f8220

    SHA1

    75a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a

    SHA256

    4f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531

    SHA512

    7ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252

  • \Users\Admin\AppData\Local\Temp\bijaweed.exe

    Filesize

    60KB

    MD5

    82d96254aa987cb34f5678b31e8f8220

    SHA1

    75a6fdf3d68e6d77dec3cf73c7c86ebf1d314b5a

    SHA256

    4f987beceb2dd955e5a4f9981bb4e4c90f78e4d1068acbfe19c3ef4f8d7f6531

    SHA512

    7ed1f35ee61ddb2f4aa1c386e53405ffcc9f5bb8e1bdf1150e13b2edeb5accccdb561740d44f3e3ed2187c5a838d8e58389f17d31271d4aaf0275ba06794a252

  • memory/2296-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2368-7-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.