Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 05:45 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
796d7b1934e23131acf7d42199020586.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
796d7b1934e23131acf7d42199020586.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
796d7b1934e23131acf7d42199020586.exe
-
Size
418KB
-
MD5
796d7b1934e23131acf7d42199020586
-
SHA1
7a6ac6c44b489c9fa269a859ff4a70c50c68c846
-
SHA256
bd57459a2f276b92b03f6c1a9302bb5f8b6f4b902301be3557f182b5cad960d8
-
SHA512
ca3d3fd1f963b3529db396ecd2e3537a09f603f3faca3ec7aaa167c563ac0a5065962dd08f7fabb6644f6490e1d93438361fc567c36a9adcaff9bef3e61b2883
-
SSDEEP
12288:sY5Ymqw/87Z2ljexOX8E5AY4mof/O3oqYiQB:sY5Ymqq87ZG2OmnFW3pT
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WdkelrI = "C:\\Users\\Admin\\AppData\\Local\\Temp\\796d7b1934e23131acf7d42199020586.exe" 796d7b1934e23131acf7d42199020586.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4024 372 WerFault.exe 85 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 372 796d7b1934e23131acf7d42199020586.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 372 796d7b1934e23131acf7d42199020586.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\796d7b1934e23131acf7d42199020586.exe"C:\Users\Admin\AppData\Local\Temp\796d7b1934e23131acf7d42199020586.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 3842⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 372 -ip 3721⤵PID:3856
Network
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request69.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.171.91.138.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestdl.dropbox.comIN AResponsedl.dropbox.comIN CNAMEedge-block-www-env.dropbox-dns.comedge-block-www-env.dropbox-dns.comIN A162.125.65.15
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:162.125.65.15:80RequestGET /u/27620206/index.html HTTP/1.1
Host: dl.dropbox.com
Accept: text/html, */*
Accept-Encoding: identity
User-Agent: Mozilla/3.0 (compatible; Indy Library)
ResponseHTTP/1.1 301 Moved Permanently
date: Sat, 27 Jan 2024 05:46:16 GMT
server: envoy
x-dropbox-request-id: 41c7fd99ab8f4f1e863a92e8f888c5ce
content-length: 0
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.65.125.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.246.116.51.in-addr.arpaIN PTRResponse
-
162.125.65.15:80http://dl.dropbox.com/u/27620206/index.htmlhttp796d7b1934e23131acf7d42199020586.exe394 B 389 B 5 4
HTTP Request
GET http://dl.dropbox.com/u/27620206/index.htmlHTTP Response
301
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
69.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
81.171.91.138.in-addr.arpa
-
60 B 121 B 1 1
DNS Request
dl.dropbox.com
DNS Response
162.125.65.15
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 122 B 1 1
DNS Request
15.65.125.162.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
104.246.116.51.in-addr.arpa