Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 00:14 UTC

General

  • Target

    5ba04342255e3c284557cd85b8abe7aa.exe

  • Size

    385KB

  • MD5

    5ba04342255e3c284557cd85b8abe7aa

  • SHA1

    369503f017ea1ebad896219dee0715fa1b2182d7

  • SHA256

    6fcca98b1f37ebd2a05204d8549185b5ac3d1ec8059210f86251c1ce752384e3

  • SHA512

    c908a61a8dcdd34b19c348e1ef593757a24144af37f7df9ec015d9f9d55e006c8b9f067373967937cc49e66ebb66a8ce13092ca0711f0abf86c164b4050b4ebf

  • SSDEEP

    6144:V9xYXUQ8RDpsbdohRcIHrPQ9WJaVLh7BJoV/RMI6ipj90k6TTLx7ZqB:rEUQosbShbPQsJaVLhz7epy/TJwB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ba04342255e3c284557cd85b8abe7aa.exe
    "C:\Users\Admin\AppData\Local\Temp\5ba04342255e3c284557cd85b8abe7aa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\5ba04342255e3c284557cd85b8abe7aa.exe
      C:\Users\Admin\AppData\Local\Temp\5ba04342255e3c284557cd85b8abe7aa.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2052

Network

  • flag-us
    DNS
    pastebin.com
    5ba04342255e3c284557cd85b8abe7aa.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.67.143
    pastebin.com
    IN A
    172.67.34.170
    pastebin.com
    IN A
    104.20.68.143
  • flag-us
    GET
    https://pastebin.com/raw/ubFNTPjt
    5ba04342255e3c284557cd85b8abe7aa.exe
    Remote address:
    104.20.67.143:443
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Mon, 15 Jan 2024 00:14:47 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: HIT
    Age: 1017
    Server: cloudflare
    CF-RAY: 8459ebab9dab0656-LHR
  • flag-us
    DNS
    www.microsoft.com
    5ba04342255e3c284557cd85b8abe7aa.exe
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    92.123.241.137
  • 104.20.67.143:443
    https://pastebin.com/raw/ubFNTPjt
    tls, http
    5ba04342255e3c284557cd85b8abe7aa.exe
    887 B
    4.5kB
    9
    8

    HTTP Request

    GET https://pastebin.com/raw/ubFNTPjt

    HTTP Response

    404
  • 8.8.8.8:53
    pastebin.com
    dns
    5ba04342255e3c284557cd85b8abe7aa.exe
    58 B
    106 B
    1
    1

    DNS Request

    pastebin.com

    DNS Response

    104.20.67.143
    172.67.34.170
    104.20.68.143

  • 8.8.8.8:53
    www.microsoft.com
    dns
    5ba04342255e3c284557cd85b8abe7aa.exe
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    92.123.241.137

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\5ba04342255e3c284557cd85b8abe7aa.exe

    Filesize

    385KB

    MD5

    4c4a9106709a1a14dd75af472420fb20

    SHA1

    c81efd968f789f305bf282e692fca27c0fef2ad1

    SHA256

    269cc0afe0b654207c9009c45f8587a6d289799c021abdf4d77960d3d408e08d

    SHA512

    b664ce3b330465313f3aa857ec239e9525edcd2808773dcd93ca9754930274e2dc52dee95136206c06241c7207c15f3104af6c887b9f5c137f288557858dbe66

  • C:\Users\Admin\AppData\Local\Temp\TarB7B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2052-16-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2052-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2052-25-0x00000000002C0000-0x000000000031F000-memory.dmp

    Filesize

    380KB

  • memory/2052-18-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/2052-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2052-86-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2052-87-0x00000000055E0000-0x000000000561C000-memory.dmp

    Filesize

    240KB

  • memory/2888-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2888-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2888-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2888-2-0x0000000000370000-0x00000000003D6000-memory.dmp

    Filesize

    408KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.