Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 20:07 UTC

General

  • Target

    XMTS20090628/程序功能/CHJ010.dll

  • Size

    11KB

  • MD5

    47797e287b035513d9e00c8f6d51537c

  • SHA1

    8d0b568b21a837aafaf9fe0f6a2c7e49335be703

  • SHA256

    74793a2c99e19087fc62d9eda89137abdba7b518a9d86417b1227f81728e9dd6

  • SHA512

    449401b1127dd579b406791265b0279bb65e9964c6d1ce2f8be8d5d6e636c3aec51b54cea55592320fa699b5be794ed0962ae123e393aa83807d1a1b788e7b5f

  • SSDEEP

    192:nIvqijC1qAnS530DlB2huL5zVyunkQRePTlttn0g9/X5gx:8bjwqAnzlouL5zVyukMoP0G/pg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\XMTS20090628\程序功能\CHJ010.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\XMTS20090628\程序功能\CHJ010.dll,#1
      2⤵
        PID:4060

    Network

    • flag-us
      DNS
      133.211.185.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.211.185.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      206.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      206.178.17.96.in-addr.arpa
      IN PTR
      Response
      206.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-206deploystaticakamaitechnologiescom
    • flag-us
      DNS
      146.177.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      146.177.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      157.123.68.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      157.123.68.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      171.39.242.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      171.39.242.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      23.160.77.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      23.160.77.104.in-addr.arpa
      IN PTR
      Response
      23.160.77.104.in-addr.arpa
      IN PTR
      a104-77-160-23deploystaticakamaitechnologiescom
    • flag-us
      DNS
      187.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      187.178.17.96.in-addr.arpa
      IN PTR
      Response
      187.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-187deploystaticakamaitechnologiescom
    • flag-us
      DNS
      22.236.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      22.236.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      240.221.184.93.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.221.184.93.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      226.162.46.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      226.162.46.104.in-addr.arpa
      IN PTR
      Response
    • 20.231.121.79:80
      156 B
      3
    • 8.8.8.8:53
      133.211.185.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      133.211.185.52.in-addr.arpa

    • 8.8.8.8:53
      206.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      206.178.17.96.in-addr.arpa

    • 8.8.8.8:53
      146.177.190.20.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      146.177.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      157.123.68.40.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      157.123.68.40.in-addr.arpa

    • 8.8.8.8:53
      171.39.242.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      171.39.242.20.in-addr.arpa

    • 8.8.8.8:53
      23.160.77.104.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      23.160.77.104.in-addr.arpa

    • 8.8.8.8:53
      187.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      187.178.17.96.in-addr.arpa

    • 8.8.8.8:53
      22.236.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      22.236.111.52.in-addr.arpa

    • 8.8.8.8:53
      240.221.184.93.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      240.221.184.93.in-addr.arpa

    • 8.8.8.8:53
      226.162.46.104.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      226.162.46.104.in-addr.arpa

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4060-0-0x0000000000400000-0x000000000040D000-memory.dmp

      Filesize

      52KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.