Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 10:56 UTC
Behavioral task
behavioral1
Sample
993dce8e99765166d85c5049951f52c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
993dce8e99765166d85c5049951f52c6.exe
Resource
win10v2004-20231215-en
General
-
Target
993dce8e99765166d85c5049951f52c6.exe
-
Size
86KB
-
MD5
993dce8e99765166d85c5049951f52c6
-
SHA1
1ff33f44c6f4179ca4dfceeedc6dbd10259bf325
-
SHA256
de997cabab2bda1334d129112199ba780d250dd923db4b4035def25755df8200
-
SHA512
0f1ebf2b075f3b045fd7885eba700ed82fb67055401e500753138083201a1d36bf3ef9c06dff18802fed6c15b2b33167f44b58aa9aae279c3439baaffc976d2a
-
SSDEEP
1536:kuMyiWMPfQSiy6kWLVvBOQ+ptrblnouy8:5SW+fQSIkQVv8QGJ9out
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4092 SiZhu.exe -
resource yara_rule behavioral2/memory/1608-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x0007000000023108-4.dat upx behavioral2/memory/4092-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1608-14-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 993dce8e99765166d85c5049951f52c6.exe File opened (read-only) \??\H: 993dce8e99765166d85c5049951f52c6.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SiZhu.exe 993dce8e99765166d85c5049951f52c6.exe File created C:\Windows\SysWOW64\SiZhu.exe 993dce8e99765166d85c5049951f52c6.exe File opened for modification C:\Windows\SysWOW64\SiZhu.exe SiZhu.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1608 993dce8e99765166d85c5049951f52c6.exe 1608 993dce8e99765166d85c5049951f52c6.exe 4092 SiZhu.exe 4092 SiZhu.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4092 1608 993dce8e99765166d85c5049951f52c6.exe 83 PID 1608 wrote to memory of 4092 1608 993dce8e99765166d85c5049951f52c6.exe 83 PID 1608 wrote to memory of 4092 1608 993dce8e99765166d85c5049951f52c6.exe 83 PID 4092 wrote to memory of 3816 4092 SiZhu.exe 84 PID 4092 wrote to memory of 3816 4092 SiZhu.exe 84 PID 4092 wrote to memory of 3816 4092 SiZhu.exe 84 PID 1608 wrote to memory of 4956 1608 993dce8e99765166d85c5049951f52c6.exe 86 PID 1608 wrote to memory of 4956 1608 993dce8e99765166d85c5049951f52c6.exe 86 PID 1608 wrote to memory of 4956 1608 993dce8e99765166d85c5049951f52c6.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\993dce8e99765166d85c5049951f52c6.exe"C:\Users\Admin\AppData\Local\Temp\993dce8e99765166d85c5049951f52c6.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\SiZhu.exeC:\Windows\system32\SiZhu.exe SiZhu2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat3⤵PID:3816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat2⤵PID:4956
-
Network
-
Remote address:8.8.8.8:53Requestwww.haorenjia11.cnIN AResponse
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request6.181.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request90.16.208.104.in-addr.arpaIN PTRResponse
-
64 B 117 B 1 1
DNS Request
www.haorenjia11.cn
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
6.181.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
90.16.208.104.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD505f52e759c787bfbf843ba36ccf734a2
SHA12d81a279dd24a320a62d184fec747ca5f70570ee
SHA2564c9b671f2169b55c0265974d2d618e9e03060a0664da88c05ea580be9eb2a7a9
SHA512efcbce3fbcb8a0e22d4b41bfcf7afe73e5dd1bf4ceded4892fdd060e993dcf7c3930c989b6eb4fe1b690ced1f70a0e9ef75dfe6b5e2a61f9be14ef9169c6d172
-
Filesize
212B
MD535c88858eb2492deb15d19f51e685c4a
SHA1e3ace5f65b36afb0d7b440512064c4996109d043
SHA2561728d38596a01364d3a8627dadc3d7b89da23df98be7a41b29667d6de90dfed0
SHA512bb583503a0184509c35630ea0f4868523b15706ecc700cbd701052154f8c0a5dca4b5230a28019b88c4500dec082980c637ba370c806a08c2c854198fade6449
-
Filesize
86KB
MD5993dce8e99765166d85c5049951f52c6
SHA11ff33f44c6f4179ca4dfceeedc6dbd10259bf325
SHA256de997cabab2bda1334d129112199ba780d250dd923db4b4035def25755df8200
SHA5120f1ebf2b075f3b045fd7885eba700ed82fb67055401e500753138083201a1d36bf3ef9c06dff18802fed6c15b2b33167f44b58aa9aae279c3439baaffc976d2a