Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 16:27 UTC

General

  • Target

    37cfb74369f5d8355e0e9e56c0904068.exe

  • Size

    19KB

  • MD5

    37cfb74369f5d8355e0e9e56c0904068

  • SHA1

    8a0a7f8de13f06411b1cdc7acce02b685439ff13

  • SHA256

    01d4c3dcaf45b7457fc051a8333136a0a28cafe93f1fd06a3e0e65666c1d9b5b

  • SHA512

    3d0d53005d73abb304d0417486c4b6aa79ec19754b5d48dc1c566e3cf46ad1a8f4db431768be70d270bd15ac68121771cbe877924e6c5bac288140fe4cf97b84

  • SSDEEP

    384:UBWoC5GDr6wc/w3HgM6vDUTAXBGCVf4WVlFvXz0SY:rRkiLw3HsDSARGG/j/Y

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
    • C:\Users\Admin\AppData\Local\Temp\37cfb74369f5d8355e0e9e56c0904068.exe
      "C:\Users\Admin\AppData\Local\Temp\37cfb74369f5d8355e0e9e56c0904068.exe"
      1⤵
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\rmass.exe
        "C:\Windows\system32\rmass.exe"
        2⤵
        • Windows security bypass
        • Drops file in Drivers directory
        • Modifies Installed Components in the registry
        • Sets file execution options in registry
        • Executes dropped EXE
        • Windows security modification
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1680
    • C:\Windows\SysWOW64\rmass.exe
      --k33p
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1132
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3488

      Network

      • flag-us
        DNS
        clbssqqihisi.mp
        rmass.exe
        Remote address:
        8.8.8.8:53
        Request
        clbssqqihisi.mp
        IN A
        Response
      • flag-us
        DNS
        clbssqqihisi.mp
        rmass.exe
        Remote address:
        8.8.8.8:53
        Request
        clbssqqihisi.mp
        IN A
        Response
      • flag-us
        DNS
        147.177.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        147.177.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        180.178.17.96.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        180.178.17.96.in-addr.arpa
        IN PTR
        Response
        180.178.17.96.in-addr.arpa
        IN PTR
        a96-17-178-180deploystaticakamaitechnologiescom
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        146.78.124.51.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        146.78.124.51.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        241.154.82.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.154.82.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        59.128.231.4.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        59.128.231.4.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        41.110.16.96.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        41.110.16.96.in-addr.arpa
        IN PTR
        Response
        41.110.16.96.in-addr.arpa
        IN PTR
        a96-16-110-41deploystaticakamaitechnologiescom
      • flag-us
        DNS
        41.110.16.96.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        41.110.16.96.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        56.126.166.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.126.166.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        104.241.123.92.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.241.123.92.in-addr.arpa
        IN PTR
        Response
        104.241.123.92.in-addr.arpa
        IN PTR
        a92-123-241-104deploystaticakamaitechnologiescom
      • flag-us
        DNS
        104.241.123.92.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.241.123.92.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        104.241.123.92.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.241.123.92.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        104.241.123.92.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.241.123.92.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        119.110.54.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        119.110.54.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        217.135.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        217.135.221.88.in-addr.arpa
        IN PTR
        Response
        217.135.221.88.in-addr.arpa
        IN PTR
        a88-221-135-217deploystaticakamaitechnologiescom
      • flag-us
        DNS
        0.205.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.205.248.87.in-addr.arpa
        IN PTR
        Response
        0.205.248.87.in-addr.arpa
        IN PTR
        https-87-248-205-0lgwllnwnet
      • flag-us
        DNS
        0.205.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.205.248.87.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        0.205.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.205.248.87.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        0.205.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.205.248.87.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        0.205.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.205.248.87.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        32.134.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        32.134.221.88.in-addr.arpa
        IN PTR
        Response
        32.134.221.88.in-addr.arpa
        IN PTR
        a88-221-134-32deploystaticakamaitechnologiescom
      • flag-us
        DNS
        32.134.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        32.134.221.88.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        11.227.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        11.227.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        43.58.199.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        43.58.199.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        15.164.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        15.164.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        240.221.184.93.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        240.221.184.93.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        206.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        206.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        131.109.69.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        131.109.69.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        131.109.69.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        131.109.69.13.in-addr.arpa
        IN PTR
      • 20.231.121.79:80
        46 B
        1
      • 87.248.205.0:80
      • 87.248.205.0:80
      • 8.8.8.8:53
        clbssqqihisi.mp
        dns
        rmass.exe
        61 B
        117 B
        1
        1

        DNS Request

        clbssqqihisi.mp

      • 8.8.8.8:53
        clbssqqihisi.mp
        dns
        rmass.exe
        61 B
        117 B
        1
        1

        DNS Request

        clbssqqihisi.mp

      • 8.8.8.8:53
        147.177.190.20.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        147.177.190.20.in-addr.arpa

      • 8.8.8.8:53
        180.178.17.96.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        180.178.17.96.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        146.78.124.51.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        146.78.124.51.in-addr.arpa

      • 8.8.8.8:53
        241.154.82.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        241.154.82.20.in-addr.arpa

      • 8.8.8.8:53
        59.128.231.4.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        59.128.231.4.in-addr.arpa

      • 8.8.8.8:53
        41.110.16.96.in-addr.arpa
        dns
        142 B
        135 B
        2
        1

        DNS Request

        41.110.16.96.in-addr.arpa

        DNS Request

        41.110.16.96.in-addr.arpa

      • 8.8.8.8:53
        56.126.166.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        56.126.166.20.in-addr.arpa

      • 8.8.8.8:53
        104.241.123.92.in-addr.arpa
        dns
        292 B
        139 B
        4
        1

        DNS Request

        104.241.123.92.in-addr.arpa

        DNS Request

        104.241.123.92.in-addr.arpa

        DNS Request

        104.241.123.92.in-addr.arpa

        DNS Request

        104.241.123.92.in-addr.arpa

      • 8.8.8.8:53
        119.110.54.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        119.110.54.20.in-addr.arpa

      • 8.8.8.8:53
        217.135.221.88.in-addr.arpa
        dns
        73 B
        139 B
        1
        1

        DNS Request

        217.135.221.88.in-addr.arpa

      • 8.8.8.8:53
        0.205.248.87.in-addr.arpa
        dns
        355 B
        116 B
        5
        1

        DNS Request

        0.205.248.87.in-addr.arpa

        DNS Request

        0.205.248.87.in-addr.arpa

        DNS Request

        0.205.248.87.in-addr.arpa

        DNS Request

        0.205.248.87.in-addr.arpa

        DNS Request

        0.205.248.87.in-addr.arpa

      • 8.8.8.8:53
        32.134.221.88.in-addr.arpa
        dns
        144 B
        137 B
        2
        1

        DNS Request

        32.134.221.88.in-addr.arpa

        DNS Request

        32.134.221.88.in-addr.arpa

      • 8.8.8.8:53
      • 8.8.8.8:53
        11.227.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        11.227.111.52.in-addr.arpa

      • 8.8.8.8:53
      • 8.8.8.8:53
        43.58.199.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        43.58.199.20.in-addr.arpa

      • 8.8.8.8:53
        15.164.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        15.164.165.52.in-addr.arpa

      • 8.8.8.8:53
        240.221.184.93.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        240.221.184.93.in-addr.arpa

      • 8.8.8.8:53
        206.23.85.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        206.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        131.109.69.13.in-addr.arpa
        dns
        144 B
        146 B
        2
        1

        DNS Request

        131.109.69.13.in-addr.arpa

        DNS Request

        131.109.69.13.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\rmass.exe

        Filesize

        19KB

        MD5

        37cfb74369f5d8355e0e9e56c0904068

        SHA1

        8a0a7f8de13f06411b1cdc7acce02b685439ff13

        SHA256

        01d4c3dcaf45b7457fc051a8333136a0a28cafe93f1fd06a3e0e65666c1d9b5b

        SHA512

        3d0d53005d73abb304d0417486c4b6aa79ec19754b5d48dc1c566e3cf46ad1a8f4db431768be70d270bd15ac68121771cbe877924e6c5bac288140fe4cf97b84

      • C:\Windows\System32\drivers\etc\hosts

        Filesize

        1KB

        MD5

        6f47b62de25d1745e296a06b3f98ed19

        SHA1

        a688bb35a4c8a5cc198985d624a1b5a6ac5b9f6f

        SHA256

        15c7218eb9cef5fa0573db657b15ce3a5f0e0609f1166df8098ca7152df505b4

        SHA512

        dea26fff8060f44bf20fe4fff2ecbacf428727f10c0f5886fb4813e28fce9cbc3d088337c84edd9857b18514c83f1bb1cf0f51518aaecef09f30e921f4d758d7

      • memory/1132-88-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/1680-8-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/1680-81-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/4996-0-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/4996-6-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.