Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 07:05 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5b648b9054475b8496b7fe3e3d562f5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b648b9054475b8496b7fe3e3d562f5a.exe
Resource
win10v2004-20231222-en
General
-
Target
5b648b9054475b8496b7fe3e3d562f5a.exe
-
Size
142KB
-
MD5
5b648b9054475b8496b7fe3e3d562f5a
-
SHA1
ce7321839540299a9c894bf1338ab6592aff9c4e
-
SHA256
6da1bb18d50b9365e9b290dc2be93ec280a7b76a121023e4e453f400a3235ffe
-
SHA512
8e14785c90ffc6c8837865f317852e04117ed5fb45c15c6e61bfd2c98a35d8f189c6f0fcb88bbaf13ba73417ac38e6142269f61dfa39bbb3c53a7842766bfcdf
-
SSDEEP
3072:inOn7t7XpdpCCTg/sxFgJaeqgKJ+BCpC0BOAIiBMwLi70QNe+rH8R70AxpSQ8:iKpdcCrTdgK4nlidu4YVHo7mQ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 840 downloadmr.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 5b648b9054475b8496b7fe3e3d562f5a.exe 1688 5b648b9054475b8496b7fe3e3d562f5a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 840 1688 5b648b9054475b8496b7fe3e3d562f5a.exe 24 PID 1688 wrote to memory of 840 1688 5b648b9054475b8496b7fe3e3d562f5a.exe 24 PID 1688 wrote to memory of 840 1688 5b648b9054475b8496b7fe3e3d562f5a.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b648b9054475b8496b7fe3e3d562f5a.exe"C:\Users\Admin\AppData\Local\Temp\5b648b9054475b8496b7fe3e3d562f5a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\nsv4901.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nsv4901.tmp\downloadmr.exe /u4e8de351-1254-4bc4-803a-1e235bc06f2f /e23652982⤵
- Executes dropped EXE
PID:840
-
Network
-
Remote address:8.8.8.8:53Request23.177.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.177.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestapi.downloadmr.comIN AResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request4.173.189.20.in-addr.arpaIN PTRResponse
-
144 B 158 B 2 1
DNS Request
23.177.190.20.in-addr.arpa
DNS Request
23.177.190.20.in-addr.arpa
-
64 B 132 B 1 1
DNS Request
api.downloadmr.com
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
360 B 137 B 5 1
DNS Request
173.178.17.96.in-addr.arpa
DNS Request
173.178.17.96.in-addr.arpa
DNS Request
173.178.17.96.in-addr.arpa
DNS Request
173.178.17.96.in-addr.arpa
DNS Request
173.178.17.96.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
11.227.111.52.in-addr.arpa
DNS Request
11.227.111.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
4.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58143e59c2b92661b705733d2ac1abe10
SHA1d9ac6750f186ad7025ce4e03082fc6b3116a3294
SHA256298d293a33588c53853c11884f93bf103d0716cdb7fcfbb4f1efaaa8b9aeb5b3
SHA5121eb9f318db0e5b409d61a8eb7a80016ac912bb7639b04b5ece8d10bedcf3881e52d27ee47769e37ba332e82bad3c826b633067557133b8fa7bce7dd4c436ad77
-
Filesize
23KB
MD530e635e76552612fdf529dd3208cb02d
SHA1c36099c86f0b7781db2dcc672ad606143405f1d5
SHA256fbc9d31b12a133d04e80b378c839e627c31c89a83fb815204e8086cad9ef1992
SHA51278762f4d5a9335e36ffccaca5472ecf10755996a44aec7f5d195c8f1027a24ee6a67d3d363ff0b74b7a66984a9890df7c0af8ed25987516d04a38058a0c0d962
-
Filesize
9KB
MD5da6da9c34888f7c6fa2b1cc46b4423f9
SHA1c28dbca6af6e4f0e05997eb932b021c282582730
SHA256602e2f046ce276dc479032a3dfdbd0bd267be8a00effbd73c8e72ec3f1ef7aa6
SHA5129e6a2767ea0bc3ac916a20066aa6bb8b05acd0d90dde0adaff1ccaa5305c9777b561c74c3a637958346616d11fd01ca099a7252c58a29f7566bd9063251c55ca