Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:44 UTC

General

  • Target

    440feb17fc2cc307d8708ce6732152a4.exe

  • Size

    385KB

  • MD5

    440feb17fc2cc307d8708ce6732152a4

  • SHA1

    19b5a7881e07475dd7a5024991e5d1d8ac15fe71

  • SHA256

    7f4db985fb7c507710c3f027fb62f4f0fcf7f16089af53e2d6118c1960a1e5bc

  • SHA512

    a5a8abe3830a9261ba9b8aa1eeb6d86a03bb77be00726df653e07e4960492af9a71a2abd1fe0504c261b10aa422a0cab5d73ee920fc8140d5e598b52ebcb6afe

  • SSDEEP

    6144:GXgY/LUEMawhM12KxSdOU5BI+4CbnsUG9XZ9KMhfksii6jWfMaH0O62fxbB:J8QiJ9U5CbCbns51ZMMhX6KfMa9z9B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe
    "C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe
      C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2692

Network

  • flag-us
    DNS
    pastebin.com
    440feb17fc2cc307d8708ce6732152a4.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.68.143
    pastebin.com
    IN A
    104.20.67.143
    pastebin.com
    IN A
    172.67.34.170
  • flag-us
    DNS
    pastebin.com
    440feb17fc2cc307d8708ce6732152a4.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
  • flag-us
    GET
    https://pastebin.com/raw/ubFNTPjt
    440feb17fc2cc307d8708ce6732152a4.exe
    Remote address:
    104.20.68.143:443
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Tue, 02 Jan 2024 04:40:33 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: HIT
    Age: 261
    Server: cloudflare
    CF-RAY: 83f05319fc8c773b-LHR
  • 104.20.68.143:443
    pastebin.com
    tls
    440feb17fc2cc307d8708ce6732152a4.exe
    504 B
    92 B
    4
    2
  • 104.20.68.143:443
    https://pastebin.com/raw/ubFNTPjt
    tls, http
    440feb17fc2cc307d8708ce6732152a4.exe
    854 B
    5.5kB
    9
    8

    HTTP Request

    GET https://pastebin.com/raw/ubFNTPjt

    HTTP Response

    404
  • 8.8.8.8:53
    pastebin.com
    dns
    440feb17fc2cc307d8708ce6732152a4.exe
    116 B
    106 B
    2
    1

    DNS Request

    pastebin.com

    DNS Request

    pastebin.com

    DNS Response

    104.20.68.143
    104.20.67.143
    172.67.34.170

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe

    Filesize

    92KB

    MD5

    a8127a485f7963b0c40bd660b735b73c

    SHA1

    272bccf540c43b0895fab70b1d444b3bc6d8a970

    SHA256

    40e1c7e82651287220d66f553b8e64562eb2f9b4dd56101cfa9515292445e90d

    SHA512

    bd6ce85575cebbc88ba59cda08201d7e1547a3b43a32c17f99d7d67fcefd3b6fe71425b2bfcec5adae2bcb9c55b7511120fbb606e54fd13dd2a249144364e374

  • C:\Users\Admin\AppData\Local\Temp\Cab2ADA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2AEC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe

    Filesize

    93KB

    MD5

    2daad87c2793927c2ab0c114cf308d0d

    SHA1

    6274441252a7bc6303d1737db2a5c5fefc1697a8

    SHA256

    1dc16ecdd24a09389a7c3bee2d2bb51297478a45a58d5422ab1630c280883875

    SHA512

    189f6c292724ce577191d9e896f717615672c775e732c97bb22bf0294467379655a3d49cc7d29b5216a149cf12c4d1da5683a13b1a695e4b27877dfc0a97530f

  • memory/2156-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2156-2-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2156-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2156-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2156-12-0x00000000014E0000-0x0000000001546000-memory.dmp

    Filesize

    408KB

  • memory/2692-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2692-21-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/2692-24-0x0000000000330000-0x000000000038F000-memory.dmp

    Filesize

    380KB

  • memory/2692-82-0x0000000005580000-0x00000000055BC000-memory.dmp

    Filesize

    240KB

  • memory/2692-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2692-76-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2692-83-0x0000000005580000-0x00000000055BC000-memory.dmp

    Filesize

    240KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.