Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 21:01 UTC
Behavioral task
behavioral1
Sample
8xyz8.rar
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
8xyz8/Defender_Settings.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
8xyz8/ReadMe.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
8xyz8/dControl.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
8xyz8/dControl.ini
Resource
win10v2004-20231215-en
General
-
Target
8xyz8/dControl.ini
-
Size
85KB
-
MD5
05450ff06366ae22654b63a6e27d1624
-
SHA1
11453c370f41287fb6339e509bb9d3c91842b379
-
SHA256
8e9a84da243905685ca77b6ef71841e610b88b7963d4de59f6dcbdd1621ecacd
-
SHA512
ee0a9605b566aa89c8c9b260e1d9c15aecbd6cddc2df47fe24ef2cafbe8923b3e025bd5cd3d34499292589a3c094dd796ab4560c8099bad2051a54928c37b4b2
-
SSDEEP
768:i/G+NmPfjsxaxdk2akexodULxEQq1wIgC+AEbSr6:1+NyjsxkKdkJdULgbWSO
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3488 NOTEPAD.EXE
Processes
Network
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request148.177.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.160.77.104.in-addr.arpaIN PTRResponse23.160.77.104.in-addr.arpaIN PTRa104-77-160-23deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request150.5.37.23.in-addr.arpaIN PTRResponse150.5.37.23.in-addr.arpaIN PTRa23-37-5-150deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request178.223.142.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.243.111.52.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
148.177.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
23.160.77.104.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
150.5.37.23.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
178.223.142.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
30.243.111.52.in-addr.arpa