Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 22:12 UTC
Static task
static1
Behavioral task
behavioral1
Sample
fbe27ad7251d741049e461c5cd248961.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fbe27ad7251d741049e461c5cd248961.exe
Resource
win10v2004-20231215-en
General
-
Target
fbe27ad7251d741049e461c5cd248961.exe
-
Size
208KB
-
MD5
fbe27ad7251d741049e461c5cd248961
-
SHA1
0ccc82eab7d1494150c7d933431c5234f37aa09d
-
SHA256
3acd37405fd412651f315fed6d1df265f0c606c81f299fbff3a72710e37cab9d
-
SHA512
523487aa22161c443777a28c6f7fa3511aa470d75c7a1f321b4f5120e27857d3b506d52fd5aa38403303492cf664eb117ce3635275b98d6298e1a7398213b8e6
-
SSDEEP
6144:TlGRgXm15iDjfqssrSVR6AFVmpP7lnn1y:8v1SqixFsJlnn1y
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4844 u.dll 3808 mpress.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5096 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3408 wrote to memory of 2940 3408 fbe27ad7251d741049e461c5cd248961.exe 90 PID 3408 wrote to memory of 2940 3408 fbe27ad7251d741049e461c5cd248961.exe 90 PID 3408 wrote to memory of 2940 3408 fbe27ad7251d741049e461c5cd248961.exe 90 PID 2940 wrote to memory of 4844 2940 cmd.exe 97 PID 2940 wrote to memory of 4844 2940 cmd.exe 97 PID 2940 wrote to memory of 4844 2940 cmd.exe 97 PID 4844 wrote to memory of 3808 4844 u.dll 94 PID 4844 wrote to memory of 3808 4844 u.dll 94 PID 4844 wrote to memory of 3808 4844 u.dll 94 PID 2940 wrote to memory of 4784 2940 cmd.exe 95 PID 2940 wrote to memory of 4784 2940 cmd.exe 95 PID 2940 wrote to memory of 4784 2940 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe"C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\465F.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save fbe27ad7251d741049e461c5cd248961.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\46DC.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\46DC.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe46DD.tmp"1⤵
- Executes dropped EXE
PID:3808
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5096
Network
-
Remote address:8.8.8.8:53Request17.53.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request81.171.91.138.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.171.91.138.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.1.37.23.in-addr.arpaIN PTRResponse183.1.37.23.in-addr.arpaIN PTRa23-37-1-183deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request183.1.37.23.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.160.77.104.in-addr.arpaIN PTRResponse28.160.77.104.in-addr.arpaIN PTRa104-77-160-28deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request206.178.17.96.in-addr.arpaIN PTRResponse206.178.17.96.in-addr.arpaIN PTRa96-17-178-206deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request206.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request206.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request157.178.17.96.in-addr.arpaIN PTRResponse157.178.17.96.in-addr.arpaIN PTRa96-17-178-157deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request157.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request178.223.142.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request178.223.142.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.160.77.104.in-addr.arpaIN PTRResponse23.160.77.104.in-addr.arpaIN PTRa104-77-160-23deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request23.160.77.104.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request181.178.17.96.in-addr.arpaIN PTRResponse181.178.17.96.in-addr.arpaIN PTRa96-17-178-181deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request181.178.17.96.in-addr.arpaIN PTRResponse181.178.17.96.in-addr.arpaIN PTRa96-17-178-181deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN A
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301242_1SRW05UUR0YI3F1X9&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301242_1SRW05UUR0YI3F1X9&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 244362
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 087235A1119C4548A3D27EFD4D02E4AF Ref B: LON04EDGE0617 Ref C: 2024-01-09T21:39:47Z
date: Tue, 09 Jan 2024 21:39:47 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301319_135UX7GSFYCP6UCBA&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301319_135UX7GSFYCP6UCBA&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301262_1RDFU04FEHLX4BCDQ&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301262_1RDFU04FEHLX4BCDQ&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301671_1BH92C2YLS6P8OGGR&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301671_1BH92C2YLS6P8OGGR&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301728_1S5SOTBKRSIDGRZ37&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301728_1S5SOTBKRSIDGRZ37&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301651_1F1H60KU4IQQHGWIG&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301651_1F1H60KU4IQQHGWIG&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
Remote address:8.8.8.8:53Request193.178.17.96.in-addr.arpaIN PTRResponse193.178.17.96.in-addr.arpaIN PTRa96-17-178-193deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request193.178.17.96.in-addr.arpaIN PTRResponse193.178.17.96.in-addr.arpaIN PTRa96-17-178-193deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request201.178.17.96.in-addr.arpaIN PTRResponse201.178.17.96.in-addr.arpaIN PTRa96-17-178-201deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request201.178.17.96.in-addr.arpaIN PTRResponse201.178.17.96.in-addr.arpaIN PTRa96-17-178-201deploystaticakamaitechnologiescom
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301651_1F1H60KU4IQQHGWIG&pid=21.2&w=1080&h=1920&c=4tls, http240.7kB 1.1MB 812 800
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301242_1SRW05UUR0YI3F1X9&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301319_135UX7GSFYCP6UCBA&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301262_1RDFU04FEHLX4BCDQ&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301671_1BH92C2YLS6P8OGGR&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301728_1S5SOTBKRSIDGRZ37&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301651_1F1H60KU4IQQHGWIG&pid=21.2&w=1080&h=1920&c=4 -
1.8kB 8.2kB 17 12
-
1.9kB 8.2kB 18 13
-
1.9kB 8.2kB 18 13
-
1.9kB 8.2kB 18 13
-
-
71 B 157 B 1 1
DNS Request
17.53.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
140 B 156 B 2 1
DNS Request
50.23.12.20.in-addr.arpa
DNS Request
50.23.12.20.in-addr.arpa
-
144 B 146 B 2 1
DNS Request
81.171.91.138.in-addr.arpa
DNS Request
81.171.91.138.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
140 B 133 B 2 1
DNS Request
183.1.37.23.in-addr.arpa
DNS Request
183.1.37.23.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
119.110.54.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
28.160.77.104.in-addr.arpa
-
216 B 137 B 3 1
DNS Request
206.178.17.96.in-addr.arpa
DNS Request
206.178.17.96.in-addr.arpa
DNS Request
206.178.17.96.in-addr.arpa
-
144 B 137 B 2 1
DNS Request
157.178.17.96.in-addr.arpa
DNS Request
157.178.17.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
205.47.74.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
146 B 294 B 2 2
DNS Request
178.223.142.52.in-addr.arpa
DNS Request
178.223.142.52.in-addr.arpa
-
144 B 137 B 2 1
DNS Request
23.160.77.104.in-addr.arpa
DNS Request
23.160.77.104.in-addr.arpa
-
144 B 274 B 2 2
DNS Request
181.178.17.96.in-addr.arpa
DNS Request
181.178.17.96.in-addr.arpa
-
124 B 173 B 2 1
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
144 B 274 B 2 2
DNS Request
193.178.17.96.in-addr.arpa
DNS Request
193.178.17.96.in-addr.arpa
-
144 B 274 B 2 2
DNS Request
201.178.17.96.in-addr.arpa
DNS Request
201.178.17.96.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580c68fbc8cf69c5887423b76dfdbf821
SHA14bb5d634c4db876cdd7117e8ed33a885ca5621e1
SHA256f227b981e47fd6ad79a07350f5cde808697eee8c57b6f8e1ce3c26a93c068ee2
SHA512c9fa9b499cdad8e1933ff10eca448c6ba5e8839212449ea8fbeba54d576ad2be403f7dad0632342c88735f0931d539a05a37f7019a86bb14ac2703c4574873ed
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD54d1c4e637e66e3aee050194ee149b1ae
SHA1542aab9bf825e8cbb8afc946b8fe555ea402a413
SHA256ba3591ba0a42bd2556af093af3beb685383b239570a459d00ad9ff0747851e25
SHA512801010a3a79285d26a7ecd84928b7e24de7adab6ad67d2d2ebc81a5639a6b9ea9f0f5cb087e1dfbda5a9cfa031bc2f1798f18d688a7cfc600cb9cde670862011
-
Filesize
24KB
MD5eea12ffa949b5ad5f71e4a086a674c35
SHA1c2a96e443b72a2869f2e9425aa775680f4cb2d72
SHA256b984ba079f06f412c63ad35289400e640e26c8df67ee58975d8822a55cf24341
SHA5126e078d975011f04ceee3f95ffaf3b13d00532b869d4305a153efa6d4c7bf8413cf7d353e1f0edf07bd982a72e9a5740c6e7bd0250c532cb7eb24a49e6fc02c9a
-
Filesize
700KB
MD5e52e1dacca253a95205caebdf9ba61be
SHA189b934078b0ebb6045bcc17eee3395fc3af688ca
SHA256bc6123009aa8bb34968892ccdd73ef4470aea0651056a9c81e10c60185b81621
SHA51298cc05f9a24eb88d6c3be905c7870db5bc4d2b36c7a62abde8b2a4e3f2066bd715173c5b17d7066b8db049d6adba0a0b7a2214d3eb54a89ce5e1e97f6afcd4c0
-
Filesize
93KB
MD5ec3db92301aa424c7a530a4d539a7f37
SHA1ce848672ac400bb50fb7ef6dfbb0f92f3b41d65c
SHA2566a9bad795d66771f71f44ef3200af4939ff91cbf757aece23ef677e08b63eebc
SHA512a6cbd9adaa09737eccce6876531aa59b43b945bcf0ec2b97645f98377061eec725bb7bc678bc7ec16cbf2ba1dcac118a382c0746846cfffde0fdc349331b6b91
-
Filesize
1KB
MD56cbca4829bb07836da4cfb00d0bcd3e1
SHA10fd4158ce8b42ae5a4f46b00d83a186c9fafd3c1
SHA256e349073597d81ea36c97382be0f901004daef692caa2ed26bc0d187740ca91db
SHA51238726f31513570ef51a822f43a72bf94ce7956221520c629b7906d93a541dd0f5e8906837a634fcba6bd26243dce11677b1704fdeaa3b1f44757dc586892971f