Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 10:28 UTC
Behavioral task
behavioral1
Sample
060798e07011c5b9cb44cebe483b72be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
060798e07011c5b9cb44cebe483b72be.exe
Resource
win10v2004-20231215-en
General
-
Target
060798e07011c5b9cb44cebe483b72be.exe
-
Size
330KB
-
MD5
060798e07011c5b9cb44cebe483b72be
-
SHA1
31ecf287cebeb549b98cb65d2f3121a73f818e93
-
SHA256
2b163d858eb3d68f778923ba37eba2a18a211b1ada71085e723580adbb61a7cd
-
SHA512
515d51b2ad855d75bc34a753fe5d1ce40c2f38997f68cd58be7ec497156a55b594f33b2b985421a7c6624d6a6e2df67bffdeac6a08429235b1c7cd12294fb3d4
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qL3ks3ih1XGWB:v6Wq4aaE6KwyF5L0Y2D1PqLF3c2M
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1384 commander.exe 3672 commander.exe -
resource yara_rule behavioral2/memory/3192-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/3192-8-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3192-8-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\commander.exe 060798e07011c5b9cb44cebe483b72be.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 060798e07011c5b9cb44cebe483b72be.exe File opened for modification C:\Windows\svhost.exe 060798e07011c5b9cb44cebe483b72be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3192 060798e07011c5b9cb44cebe483b72be.exe 3192 060798e07011c5b9cb44cebe483b72be.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3192 wrote to memory of 1384 3192 060798e07011c5b9cb44cebe483b72be.exe 87 PID 3192 wrote to memory of 1384 3192 060798e07011c5b9cb44cebe483b72be.exe 87 PID 3192 wrote to memory of 1384 3192 060798e07011c5b9cb44cebe483b72be.exe 87 PID 1384 wrote to memory of 2808 1384 commander.exe 89 PID 1384 wrote to memory of 2808 1384 commander.exe 89 PID 1384 wrote to memory of 2808 1384 commander.exe 89 PID 3192 wrote to memory of 3672 3192 060798e07011c5b9cb44cebe483b72be.exe 91 PID 3192 wrote to memory of 3672 3192 060798e07011c5b9cb44cebe483b72be.exe 91 PID 3192 wrote to memory of 3672 3192 060798e07011c5b9cb44cebe483b72be.exe 91 PID 3672 wrote to memory of 4708 3672 commander.exe 93 PID 3672 wrote to memory of 4708 3672 commander.exe 93 PID 3672 wrote to memory of 4708 3672 commander.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\060798e07011c5b9cb44cebe483b72be.exe"C:\Users\Admin\AppData\Local\Temp\060798e07011c5b9cb44cebe483b72be.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\commander.execommander.exe /C at 9:00 /interactive C:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\at.exeat 9:00 /interactive C:\Windows\svhost.exe3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\commander.execommander.exe /C schtasks /run /tn at12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /tn at13⤵PID:4708
-
-
Network
-
Remote address:8.8.8.8:53Request18.53.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=37783F3F0D8D627C2C892CD30C6D63EE; domain=.bing.com; expires=Sun, 12-Jan-2025 11:41:20 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 957FB0021B8A4AB7B4AB82931E282FAF Ref B: LON04EDGE1121 Ref C: 2023-12-19T11:41:20Z
date: Tue, 19 Dec 2023 11:41:19 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=37783F3F0D8D627C2C892CD30C6D63EE
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=fe0oKbrqKf6z67GnnHY6d0cB9MD-vsIRSg2R_xNaYEM; domain=.bing.com; expires=Sun, 12-Jan-2025 11:41:20 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 74B6C15CD1FC4B5C9312E0FA874BEC05 Ref B: LON04EDGE1121 Ref C: 2023-12-19T11:41:20Z
date: Tue, 19 Dec 2023 11:41:20 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=37783F3F0D8D627C2C892CD30C6D63EE; MSPTC=fe0oKbrqKf6z67GnnHY6d0cB9MD-vsIRSg2R_xNaYEM
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6C8B9730B59345F69B133D526981871E Ref B: LON04EDGE1121 Ref C: 2023-12-19T11:41:20Z
date: Tue, 19 Dec 2023 11:41:20 GMT
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request209.178.17.96.in-addr.arpaIN PTRResponse209.178.17.96.in-addr.arpaIN PTRa96-17-178-209deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request216.143.123.92.in-addr.arpaIN PTRResponse216.143.123.92.in-addr.arpaIN PTRa92-123-143-216deploystaticakamaitechnologiescom
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid=tls, http22.0kB 9.4kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4c0f513b39c540459bfc368668699f7c&localId=w:E944F1F3-CBEC-A3DA-080B-887FDBFE3333&deviceId=6896190258816330&anid=HTTP Response
204
-
71 B 157 B 1 1
DNS Request
18.53.126.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
209.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
216.143.123.92.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5931a7e7ffd8a72755f58864c9fe2c278
SHA1eb9884506d72a08687662123e1fe05677d5c2388
SHA2568455c6f5910646dac2820a5b78dfd05a8b3177d00fc916f73b0b8f908ad2d210
SHA512a3bc7d7c3bf26752c859da0539e09182340c4be8e6071d5e800f5686f958b53d7868c6eeeba740a6bf2ed5bd64e9c222967beaab857fec81be7b62e5408a3849