Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 09:12 UTC
Static task
static1
Behavioral task
behavioral1
Sample
a17bea930fd914ae3a089c5232206210.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a17bea930fd914ae3a089c5232206210.exe
Resource
win10v2004-20240221-en
General
-
Target
a17bea930fd914ae3a089c5232206210.exe
-
Size
115KB
-
MD5
a17bea930fd914ae3a089c5232206210
-
SHA1
2fd76f01e9ad49dd8dd43d22d76a064b2508559f
-
SHA256
692b9d5f05c805d37fb1aac3da5abf15070e66b4936f1fe4a57cf75cc8f006d0
-
SHA512
bf3d45de379128bb401feb3ae511de3690a7756116ab7d404264dc29b239cd97e8b8f34ec2a23a72c413c88194ed9bc6c4a7546537e7e55e223be24565a0959f
-
SSDEEP
1536:EItjjAIIKrkdFtFq5WY+CijpODGlPSlO9Ap/juF2z64GGPHD25a8GcxJK:HwfFtIkj1Os6juFgvDoWj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3044 netprotocol.exe 5028 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" a17bea930fd914ae3a089c5232206210.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2064 set thread context of 664 2064 a17bea930fd914ae3a089c5232206210.exe 89 PID 3044 set thread context of 5028 3044 netprotocol.exe 94 -
Program crash 2 IoCs
pid pid_target Process procid_target 3680 2064 WerFault.exe 84 4964 3044 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2064 wrote to memory of 664 2064 a17bea930fd914ae3a089c5232206210.exe 89 PID 2064 wrote to memory of 664 2064 a17bea930fd914ae3a089c5232206210.exe 89 PID 2064 wrote to memory of 664 2064 a17bea930fd914ae3a089c5232206210.exe 89 PID 2064 wrote to memory of 664 2064 a17bea930fd914ae3a089c5232206210.exe 89 PID 2064 wrote to memory of 664 2064 a17bea930fd914ae3a089c5232206210.exe 89 PID 664 wrote to memory of 3044 664 a17bea930fd914ae3a089c5232206210.exe 91 PID 664 wrote to memory of 3044 664 a17bea930fd914ae3a089c5232206210.exe 91 PID 664 wrote to memory of 3044 664 a17bea930fd914ae3a089c5232206210.exe 91 PID 3044 wrote to memory of 5028 3044 netprotocol.exe 94 PID 3044 wrote to memory of 5028 3044 netprotocol.exe 94 PID 3044 wrote to memory of 5028 3044 netprotocol.exe 94 PID 3044 wrote to memory of 5028 3044 netprotocol.exe 94 PID 3044 wrote to memory of 5028 3044 netprotocol.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe"C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exeC:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe4⤵
- Executes dropped EXE
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 4524⤵
- Program crash
PID:4964
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 4402⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2064 -ip 20641⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3044 -ip 30441⤵PID:4052
Network
-
Remote address:8.8.8.8:53Request25.140.123.92.in-addr.arpaIN PTRResponse25.140.123.92.in-addr.arpaIN PTRa92-123-140-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestrydeyt.beIN AResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Requestethsay.beIN AResponse
-
Remote address:8.8.8.8:53Requesteksyghskgsbakrys.comIN AResponse
-
Remote address:8.8.8.8:53Requestmsrgejsdyvekadh.comIN AResponse
-
Remote address:8.8.8.8:53Requestrydeyt.beIN AResponse
-
Remote address:8.8.8.8:53Requestethsay.beIN AResponse
-
Remote address:8.8.8.8:53Requesteksyghskgsbakrys.comIN AResponse
-
Remote address:8.8.8.8:53Requestmsrgejsdyvekadh.comIN AResponse
-
Remote address:8.8.8.8:53Request209.80.50.20.in-addr.arpaIN PTRResponse
-
72 B 137 B 1 1
DNS Request
25.140.123.92.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
55 B 124 B 1 1
DNS Request
rydeyt.be
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
55 B 124 B 1 1
DNS Request
ethsay.be
-
66 B 139 B 1 1
DNS Request
eksyghskgsbakrys.com
-
65 B 138 B 1 1
DNS Request
msrgejsdyvekadh.com
-
55 B 124 B 1 1
DNS Request
rydeyt.be
-
55 B 124 B 1 1
DNS Request
ethsay.be
-
66 B 139 B 1 1
DNS Request
eksyghskgsbakrys.com
-
65 B 138 B 1 1
DNS Request
msrgejsdyvekadh.com
-
71 B 157 B 1 1
DNS Request
209.80.50.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD52d5ecf558ca163535dd0ce23846e699f
SHA16b4a48ad111d5c9cbe9167f5d975c944d35c3ccc
SHA256a35f7146650cdb0ad7467a47696f4a2d16ec3ee1829318f16fa18edf1d5aee71
SHA512bdcc0f8734ca99491940b5b42b366e150032f9f71f96f337501d7e08433338b8c27b90a5ea991c1f0793747bb173e71b425bb5afbaaa3e6387353c8ec3aaf02f