Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 06:46 UTC

General

  • Target

    8babb6a95414bdad9af629975bc620bb.exe

  • Size

    10KB

  • MD5

    8babb6a95414bdad9af629975bc620bb

  • SHA1

    326e2bcdc7d7085db90a6534c90dd441c8a9c992

  • SHA256

    c44384464c5823ac5c34b5d5c5465ac24e6f4c8d4e41239910c3e03a2154fbbb

  • SHA512

    4710dcf6eb60d6dac55a69f596a063e89df88dcfa9a96cf514502898d6d85b3fb0d7c6fd4154e676e19287bc3a40d7012d5a86c9261b388ec6fa49ed38873f7e

  • SSDEEP

    192:w5xYI3Z07C9Y4Mgkd92/O7lXsZnH1KYzWTpfuL+Lb4fwGlAdRpXbxXMb+:6xLJ07bHo/GknH1KYaAL+L2lIW+

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8babb6a95414bdad9af629975bc620bb.exe
    "C:\Users\Admin\AppData\Local\Temp\8babb6a95414bdad9af629975bc620bb.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\mduaeyk.exe
      C:\Windows\system32\mduaeyk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:3420
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\8babb6a95414bdad9af629975bc620bb.exe.bat
      2⤵
        PID:2792

    Network

    • flag-us
      DNS
      13.86.106.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      13.86.106.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      0.205.248.87.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      0.205.248.87.in-addr.arpa
      IN PTR
      Response
      0.205.248.87.in-addr.arpa
      IN PTR
      https-87-248-205-0lgwllnwnet
    • flag-us
      DNS
      0.159.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      0.159.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      103.169.127.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      103.169.127.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      206.23.85.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      206.23.85.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.134.221.88.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.134.221.88.in-addr.arpa
      IN PTR
      Response
      18.134.221.88.in-addr.arpa
      IN PTR
      a88-221-134-18deploystaticakamaitechnologiescom
    • flag-us
      DNS
      114.110.16.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      114.110.16.96.in-addr.arpa
      IN PTR
      Response
      114.110.16.96.in-addr.arpa
      IN PTR
      a96-16-110-114deploystaticakamaitechnologiescom
    • flag-us
      DNS
      178.223.142.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      178.223.142.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      173.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      173.178.17.96.in-addr.arpa
      IN PTR
      Response
      173.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-173deploystaticakamaitechnologiescom
    • flag-us
      DNS
      194.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      194.178.17.96.in-addr.arpa
      IN PTR
      Response
      194.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-194deploystaticakamaitechnologiescom
    • flag-us
      DNS
      18.173.189.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.173.189.20.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      13.86.106.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      13.86.106.20.in-addr.arpa

    • 8.8.8.8:53
      0.205.248.87.in-addr.arpa
      dns
      71 B
      116 B
      1
      1

      DNS Request

      0.205.248.87.in-addr.arpa

    • 8.8.8.8:53
      0.159.190.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      0.159.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      103.169.127.40.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      103.169.127.40.in-addr.arpa

    • 8.8.8.8:53
      206.23.85.13.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      206.23.85.13.in-addr.arpa

    • 8.8.8.8:53
      18.134.221.88.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      18.134.221.88.in-addr.arpa

    • 8.8.8.8:53
      114.110.16.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      114.110.16.96.in-addr.arpa

    • 8.8.8.8:53
      178.223.142.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      178.223.142.52.in-addr.arpa

    • 8.8.8.8:53
      173.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      173.178.17.96.in-addr.arpa

    • 8.8.8.8:53
      194.178.17.96.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      194.178.17.96.in-addr.arpa

    • 8.8.8.8:53
      18.173.189.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      18.173.189.20.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8babb6a95414bdad9af629975bc620bb.exe.bat

      Filesize

      182B

      MD5

      99ae6980b6fa509ebd3ad3fcf82bb20c

      SHA1

      9c614d28aa22ec8d2e4c7f687b12dd5540a0857d

      SHA256

      20d46077628b370284d85bd73db0a9af2e33806dac3a4beaa16ee69bd08f03d9

      SHA512

      c7d79cf0c761d788ceff37f3e2bbda2cd3f4bf5b023a54d1fb43f0929ff9997d30c92e6dbbfa48b369d145ff9f112c0b1a22b74e761d1912ee167cba6a5d6233

    • C:\Windows\SysWOW64\mduaeyk.exe

      Filesize

      10KB

      MD5

      8babb6a95414bdad9af629975bc620bb

      SHA1

      326e2bcdc7d7085db90a6534c90dd441c8a9c992

      SHA256

      c44384464c5823ac5c34b5d5c5465ac24e6f4c8d4e41239910c3e03a2154fbbb

      SHA512

      4710dcf6eb60d6dac55a69f596a063e89df88dcfa9a96cf514502898d6d85b3fb0d7c6fd4154e676e19287bc3a40d7012d5a86c9261b388ec6fa49ed38873f7e

    • memory/3036-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3036-8-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3420-10-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.