Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
b4d051eb4e505340638048ae8ada9899.exe
Resource
win7-20240221-en
General
-
Target
b4d051eb4e505340638048ae8ada9899.exe
-
Size
3.1MB
-
MD5
b4d051eb4e505340638048ae8ada9899
-
SHA1
fadd88fad71647894d3aa76010c6606a60388f23
-
SHA256
d03ba24ab70fa01053ef1b27420a0585540d371702c06332bfa1c7fb8999574d
-
SHA512
cdd13f5b6fe6193effa755115685b0df1e2c2003d781e05a93a5b05750a9818a3ff00763fe25e52f8bf60e4006718dc80f203e0705772c6df56e4443762dc8d9
-
SSDEEP
49152:qitOd4k7ydepSSPIZDscC+QZKDVdfu31r:qiK4IIZYfZKDVQFr
Malware Config
Signatures
-
Blocklisted process makes network request 25 IoCs
flow pid Process 83 1468 cmd.exe 89 1468 cmd.exe 91 1468 cmd.exe 92 1468 cmd.exe 97 1468 cmd.exe 100 1468 cmd.exe 102 1468 cmd.exe 107 1468 cmd.exe 108 1468 cmd.exe 110 1468 cmd.exe 111 1468 cmd.exe 112 1468 cmd.exe 113 1468 cmd.exe 114 1468 cmd.exe 115 1468 cmd.exe 116 1468 cmd.exe 117 1468 cmd.exe 118 1468 cmd.exe 119 1468 cmd.exe 120 1468 cmd.exe 122 1468 cmd.exe 123 1468 cmd.exe 124 1468 cmd.exe 126 1468 cmd.exe 130 1468 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4288 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 88 api.ipify.org 89 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\cms.job cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1192 b4d051eb4e505340638048ae8ada9899.exe 2016 notepad.exe 2016 notepad.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe 1468 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2016 notepad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1468 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92 PID 1192 wrote to memory of 2016 1192 b4d051eb4e505340638048ae8ada9899.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe"C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:4288
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5c12e7e89646953cb07d17ab1d2ebe5b3
SHA13552baba3ebeda91f981b78a567f34f7d23491a3
SHA256039f82b435c5e2ed29c5158ec8ea8b2bf57e84014bbffe8951a447ba763564fc
SHA512953f43d30f3fb916523116b61ac138669653c50de116b50c66009aefbc8e332033b06d9913cc3c89699af13d988e377771c43228d64eda8dddaf031b5cabe072