Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 09:12 UTC

General

  • Target

    a17bea930fd914ae3a089c5232206210.exe

  • Size

    115KB

  • MD5

    a17bea930fd914ae3a089c5232206210

  • SHA1

    2fd76f01e9ad49dd8dd43d22d76a064b2508559f

  • SHA256

    692b9d5f05c805d37fb1aac3da5abf15070e66b4936f1fe4a57cf75cc8f006d0

  • SHA512

    bf3d45de379128bb401feb3ae511de3690a7756116ab7d404264dc29b239cd97e8b8f34ec2a23a72c413c88194ed9bc6c4a7546537e7e55e223be24565a0959f

  • SSDEEP

    1536:EItjjAIIKrkdFtFq5WY+CijpODGlPSlO9Ap/juF2z64GGPHD25a8GcxJK:HwfFtIkj1Os6juFgvDoWj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe
    "C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe
      C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Users\Admin\AppData\Roaming\netprotocol.exe
        C:\Users\Admin\AppData\Roaming\netprotocol.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Users\Admin\AppData\Roaming\netprotocol.exe
          C:\Users\Admin\AppData\Roaming\netprotocol.exe
          4⤵
          • Executes dropped EXE
          PID:5028
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 452
          4⤵
          • Program crash
          PID:4964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 440
      2⤵
      • Program crash
      PID:3680
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2064 -ip 2064
    1⤵
      PID:2072
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3044 -ip 3044
      1⤵
        PID:4052

      Network

      • flag-us
        DNS
        25.140.123.92.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        25.140.123.92.in-addr.arpa
        IN PTR
        Response
        25.140.123.92.in-addr.arpa
        IN PTR
        a92-123-140-25deploystaticakamaitechnologiescom
      • flag-us
        DNS
        57.169.31.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        57.169.31.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        157.123.68.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        157.123.68.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        56.126.166.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.126.166.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.134.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.134.221.88.in-addr.arpa
        IN PTR
        Response
        18.134.221.88.in-addr.arpa
        IN PTR
        a88-221-134-18deploystaticakamaitechnologiescom
      • flag-us
        DNS
        rydeyt.be
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        rydeyt.be
        IN A
        Response
      • flag-us
        DNS
        0.205.248.87.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        0.205.248.87.in-addr.arpa
        IN PTR
        Response
        0.205.248.87.in-addr.arpa
        IN PTR
        https-87-248-205-0lgwllnwnet
      • flag-us
        DNS
        ethsay.be
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        ethsay.be
        IN A
        Response
      • flag-us
        DNS
        eksyghskgsbakrys.com
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        eksyghskgsbakrys.com
        IN A
        Response
      • flag-us
        DNS
        msrgejsdyvekadh.com
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        msrgejsdyvekadh.com
        IN A
        Response
      • flag-us
        DNS
        rydeyt.be
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        rydeyt.be
        IN A
        Response
      • flag-us
        DNS
        ethsay.be
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        ethsay.be
        IN A
        Response
      • flag-us
        DNS
        eksyghskgsbakrys.com
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        eksyghskgsbakrys.com
        IN A
        Response
      • flag-us
        DNS
        msrgejsdyvekadh.com
        netprotocol.exe
        Remote address:
        8.8.8.8:53
        Request
        msrgejsdyvekadh.com
        IN A
        Response
      • flag-us
        DNS
        209.80.50.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        209.80.50.20.in-addr.arpa
        IN PTR
        Response
      No results found
      • 8.8.8.8:53
        25.140.123.92.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        25.140.123.92.in-addr.arpa

      • 8.8.8.8:53
        57.169.31.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        57.169.31.20.in-addr.arpa

      • 8.8.8.8:53
        157.123.68.40.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        157.123.68.40.in-addr.arpa

      • 8.8.8.8:53
        56.126.166.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        56.126.166.20.in-addr.arpa

      • 8.8.8.8:53
        18.134.221.88.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        18.134.221.88.in-addr.arpa

      • 8.8.8.8:53
        rydeyt.be
        dns
        netprotocol.exe
        55 B
        124 B
        1
        1

        DNS Request

        rydeyt.be

      • 8.8.8.8:53
        0.205.248.87.in-addr.arpa
        dns
        71 B
        116 B
        1
        1

        DNS Request

        0.205.248.87.in-addr.arpa

      • 8.8.8.8:53
        ethsay.be
        dns
        netprotocol.exe
        55 B
        124 B
        1
        1

        DNS Request

        ethsay.be

      • 8.8.8.8:53
        eksyghskgsbakrys.com
        dns
        netprotocol.exe
        66 B
        139 B
        1
        1

        DNS Request

        eksyghskgsbakrys.com

      • 8.8.8.8:53
        msrgejsdyvekadh.com
        dns
        netprotocol.exe
        65 B
        138 B
        1
        1

        DNS Request

        msrgejsdyvekadh.com

      • 8.8.8.8:53
        rydeyt.be
        dns
        netprotocol.exe
        55 B
        124 B
        1
        1

        DNS Request

        rydeyt.be

      • 8.8.8.8:53
        ethsay.be
        dns
        netprotocol.exe
        55 B
        124 B
        1
        1

        DNS Request

        ethsay.be

      • 8.8.8.8:53
        eksyghskgsbakrys.com
        dns
        netprotocol.exe
        66 B
        139 B
        1
        1

        DNS Request

        eksyghskgsbakrys.com

      • 8.8.8.8:53
        msrgejsdyvekadh.com
        dns
        netprotocol.exe
        65 B
        138 B
        1
        1

        DNS Request

        msrgejsdyvekadh.com

      • 8.8.8.8:53
        209.80.50.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        209.80.50.20.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\netprotocol.exe

        Filesize

        115KB

        MD5

        2d5ecf558ca163535dd0ce23846e699f

        SHA1

        6b4a48ad111d5c9cbe9167f5d975c944d35c3ccc

        SHA256

        a35f7146650cdb0ad7467a47696f4a2d16ec3ee1829318f16fa18edf1d5aee71

        SHA512

        bdcc0f8734ca99491940b5b42b366e150032f9f71f96f337501d7e08433338b8c27b90a5ea991c1f0793747bb173e71b425bb5afbaaa3e6387353c8ec3aaf02f

      • memory/664-0-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/664-1-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/664-2-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/664-4-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/664-8-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/5028-14-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/5028-16-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/5028-17-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      • memory/5028-18-0x0000000000400000-0x000000000042B000-memory.dmp

        Filesize

        172KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.