Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 09:39 UTC
Behavioral task
behavioral1
Sample
282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe
Resource
win10v2004-20240226-en
General
-
Target
282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe
-
Size
3.8MB
-
MD5
5097a614fb6ce56a15843028c4c19eaf
-
SHA1
0470578de31da2e49d84596c08acb6348ed2db08
-
SHA256
282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469
-
SHA512
aaad997da6ac57a3afec3e372792cb5ebb4f97a052fd1d3d635a2cf475a95d21454dd4084bed2bd5f5aa1c7c22938ddd9b9f66f3ec14ac04ef2fcc318d3b97b6
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/5mlwXVZ4FB:5+R/eZADUXR
Malware Config
Extracted
bitrat
1.38
microupdate.securitytactics.com:9999
-
communication_password
d9909824688daaad46d441eefd81eb38
-
install_dir
Solitare
-
install_file
NRT.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NRT = "C:\\Users\\Admin\\AppData\\Local\\Solitare\\NRT.exe" 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NRT = "C:\\Users\\Admin\\AppData\\Local\\Solitare\\NRT.exe\ue800" 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe -
Suspicious behavior: RenamesItself 30 IoCs
pid Process 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe 1728 282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe"C:\Users\Admin\AppData\Local\Temp\282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1728
Network
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=3C40B658CF056D330752A26CCEE56C46; domain=.bing.com; expires=Tue, 25-Mar-2025 09:39:37 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: ADC15BBE0CDD4255A1F18E0FB668F8BF Ref B: LON04EDGE1015 Ref C: 2024-02-29T09:39:37Z
date: Thu, 29 Feb 2024 09:39:37 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3C40B658CF056D330752A26CCEE56C46
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=QuOPowd3ABSZU88ME2iEYwwP17YK2F9hF-krkrA1kv8; domain=.bing.com; expires=Tue, 25-Mar-2025 09:39:37 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 9E3728B633094C5F95E815480166310D Ref B: LON04EDGE1015 Ref C: 2024-02-29T09:39:37Z
date: Thu, 29 Feb 2024 09:39:37 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3C40B658CF056D330752A26CCEE56C46; MSPTC=QuOPowd3ABSZU88ME2iEYwwP17YK2F9hF-krkrA1kv8
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4BDFD8E432C64F7AB91A94BCD98D6E42 Ref B: LON04EDGE1015 Ref C: 2024-02-29T09:39:37Z
date: Thu, 29 Feb 2024 09:39:37 GMT
-
Remote address:8.8.8.8:53Request175.178.17.96.in-addr.arpaIN PTRResponse175.178.17.96.in-addr.arpaIN PTRa96-17-178-175deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
DNSmicroupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exeRemote address:8.8.8.8:53Requestmicroupdate.securitytactics.comIN AResponsemicroupdate.securitytactics.comIN A185.154.20.85
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
DNSmicroupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exeRemote address:8.8.8.8:53Requestmicroupdate.securitytactics.comIN AResponsemicroupdate.securitytactics.comIN A185.154.20.85
-
Remote address:8.8.8.8:53Request185.178.17.96.in-addr.arpaIN PTRResponse185.178.17.96.in-addr.arpaIN PTRa96-17-178-185deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
DNSmicroupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exeRemote address:8.8.8.8:53Requestmicroupdate.securitytactics.comIN AResponsemicroupdate.securitytactics.comIN A185.154.20.85
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=tls, http22.0kB 9.2kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=349fedfcceda48358d6b4b2f942b61c1&localId=w:011BA1D4-FCB1-62A8-177E-91C13F9689FB&deviceId=6966557510629837&anid=HTTP Response
204 -
185.154.20.85:9999microupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe260 B 5
-
185.154.20.85:9999microupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe260 B 5
-
185.154.20.85:9999microupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe260 B 5
-
185.154.20.85:9999microupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe260 B 5
-
185.154.20.85:9999microupdate.securitytactics.com282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe208 B 4
-
71 B 157 B 1 1
DNS Request
74.32.126.40.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
72 B 137 B 1 1
DNS Request
175.178.17.96.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
8.8.8.8:53microupdate.securitytactics.comdns282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe77 B 93 B 1 1
DNS Request
microupdate.securitytactics.com
DNS Response
185.154.20.85
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
8.8.8.8:53microupdate.securitytactics.comdns282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe77 B 93 B 1 1
DNS Request
microupdate.securitytactics.com
DNS Response
185.154.20.85
-
72 B 137 B 1 1
DNS Request
185.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
8.8.8.8:53microupdate.securitytactics.comdns282c80ddca6352b2411ce903f0f4e40fa7a7bf06e5688aa5cdee9b5bafe03469.exe77 B 93 B 1 1
DNS Request
microupdate.securitytactics.com
DNS Response
185.154.20.85