Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 16:10 UTC
Static task
static1
Behavioral task
behavioral1
Sample
46a6d599535c3b51644e102f65929c66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46a6d599535c3b51644e102f65929c66.exe
Resource
win10v2004-20231215-en
General
-
Target
46a6d599535c3b51644e102f65929c66.exe
-
Size
141KB
-
MD5
46a6d599535c3b51644e102f65929c66
-
SHA1
2115013bfc093dbfa96e802f246bdb262503c381
-
SHA256
cfe2896dbf34e40c57b1379c2606f37811b614b2df5dd8123e9efe56de7e9efb
-
SHA512
3856dc9786e84f9c0453b2640e7d2d09127d947a1057fed833e7e1bc25e08658e53cae8eea497531abab8f570a5eff7b7e937a219f588e73f44de2dd2b74eed0
-
SSDEEP
3072:Aa9mSvkAZ2M5MPACog7DMM/qX0Ktj2FbjBGhMYctCgggggDpKiuxEjFq5ukj:AaENi2MGYg2BctCgggggDpK/r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 46a6d599535c3b51644e102f65929c66.exe -
Executes dropped EXE 1 IoCs
pid Process 1412 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\explorer.exe" explorer.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\W: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\K: explorer.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\Q: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\Y: explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 46a6d599535c3b51644e102f65929c66.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 1412 3800 46a6d599535c3b51644e102f65929c66.exe 104 PID 3800 wrote to memory of 1412 3800 46a6d599535c3b51644e102f65929c66.exe 104 PID 3800 wrote to memory of 1412 3800 46a6d599535c3b51644e102f65929c66.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\46a6d599535c3b51644e102f65929c66.exe"C:\Users\Admin\AppData\Local\Temp\46a6d599535c3b51644e102f65929c66.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
PID:1412
-
Network
-
Remote address:8.8.8.8:53Request2.181.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request150.1.37.23.in-addr.arpaIN PTRResponse150.1.37.23.in-addr.arpaIN PTRa23-37-1-150deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.2.37.23.in-addr.arpaIN PTRResponse11.2.37.23.in-addr.arpaIN PTRa23-37-2-11deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.2.37.23.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request204.178.17.96.in-addr.arpaIN PTRResponse204.178.17.96.in-addr.arpaIN PTRa96-17-178-204deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request193.178.17.96.in-addr.arpaIN PTRResponse193.178.17.96.in-addr.arpaIN PTRa96-17-178-193deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request16.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request16.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN A
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301220_18O58FXYXLPJZL3DY&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301220_18O58FXYXLPJZL3DY&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 553003
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 233E80C18EA7487CBF597750DF8C7E1E Ref B: LON04EDGE1018 Ref C: 2024-01-06T16:13:53Z
date: Sat, 06 Jan 2024 16:13:53 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301173_11CL6NTG6CSIMT5HR&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301173_11CL6NTG6CSIMT5HR&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 541009
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C2DE6AC8A6904B42B2BE0C68EDB2365C Ref B: LON04EDGE1018 Ref C: 2024-01-06T16:13:53Z
date: Sat, 06 Jan 2024 16:13:53 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301629_1OQFQHDVLTEIOH8CU&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301629_1OQFQHDVLTEIOH8CU&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301582_1MLHFWTHBIK9NA4JB&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301582_1MLHFWTHBIK9NA4JB&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301020_14A3TVXX0O1AF1LY0&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301020_14A3TVXX0O1AF1LY0&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
Remote address:8.8.8.8:53Requestpjz.no-ip.infoIN AResponse
-
Remote address:8.8.8.8:53Requestpjz.no-ip.infoIN AResponse
-
Remote address:8.8.8.8:53Requestpjz.no-ip.infoIN AResponse
-
Remote address:8.8.8.8:53Requestpjz.no-ip.infoIN AResponse
-
1.4kB 9.1kB 15 11
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301020_14A3TVXX0O1AF1LY0&pid=21.2&w=1920&h=1080&c=4tls, http216.5kB 436.2kB 322 323
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301220_18O58FXYXLPJZL3DY&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301173_11CL6NTG6CSIMT5HR&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301629_1OQFQHDVLTEIOH8CU&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301582_1MLHFWTHBIK9NA4JB&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301020_14A3TVXX0O1AF1LY0&pid=21.2&w=1920&h=1080&c=4
-
71 B 157 B 1 1
DNS Request
2.181.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
213 B 157 B 3 1
DNS Request
26.35.223.20.in-addr.arpa
DNS Request
26.35.223.20.in-addr.arpa
DNS Request
26.35.223.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
150.1.37.23.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
59.128.231.4.in-addr.arpa
DNS Request
59.128.231.4.in-addr.arpa
-
146 B 147 B 2 1
DNS Request
103.169.127.40.in-addr.arpa
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.204.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
138 B 131 B 2 1
DNS Request
11.2.37.23.in-addr.arpa
DNS Request
11.2.37.23.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
204.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
193.178.17.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
144 B 316 B 2 2
DNS Request
16.173.189.20.in-addr.arpa
DNS Request
16.173.189.20.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
146.78.124.51.in-addr.arpa
DNS Request
146.78.124.51.in-addr.arpa
-
124 B 173 B 2 1
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
120 B 240 B 2 2
DNS Request
pjz.no-ip.info
DNS Request
pjz.no-ip.info
-
120 B 240 B 2 2
DNS Request
pjz.no-ip.info
DNS Request
pjz.no-ip.info
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD546a6d599535c3b51644e102f65929c66
SHA12115013bfc093dbfa96e802f246bdb262503c381
SHA256cfe2896dbf34e40c57b1379c2606f37811b614b2df5dd8123e9efe56de7e9efb
SHA5123856dc9786e84f9c0453b2640e7d2d09127d947a1057fed833e7e1bc25e08658e53cae8eea497531abab8f570a5eff7b7e937a219f588e73f44de2dd2b74eed0