Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 00:58 UTC

General

  • Target

    e0647ad5202ed4a2b09a10b71e185f52.exe

  • Size

    1.5MB

  • MD5

    e0647ad5202ed4a2b09a10b71e185f52

  • SHA1

    cbbd5e8b046533cd2369e7c957933af84c56eec3

  • SHA256

    b8beb089f369ffc86f76b1700d8938adeff41c6535770c3899ac113ed644fac3

  • SHA512

    eafd0e7ffd95f2ee783ed5cf987ef1d904931df295de699e20e7da203874f56be0b9218d858e32adbd30e0470d556af03287cb991d96842271e1cb3d6b2564fd

  • SSDEEP

    24576:uDwxnIsBgIBtD65b10hJaothZ2/T6FBBjNPI5lqkfZSkHR82b10hJaothZ2/T6FP:eUIW5Bta/ofqg4/ofp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0647ad5202ed4a2b09a10b71e185f52.exe
    "C:\Users\Admin\AppData\Local\Temp\e0647ad5202ed4a2b09a10b71e185f52.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\e0647ad5202ed4a2b09a10b71e185f52.exe
      C:\Users\Admin\AppData\Local\Temp\e0647ad5202ed4a2b09a10b71e185f52.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2996

Network

  • flag-us
    DNS
    pastebin.com
    e0647ad5202ed4a2b09a10b71e185f52.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.67.143
    pastebin.com
    IN A
    104.20.68.143
    pastebin.com
    IN A
    172.67.34.170
  • flag-us
    GET
    https://pastebin.com/raw/ubFNTPjt
    e0647ad5202ed4a2b09a10b71e185f52.exe
    Remote address:
    104.20.67.143:443
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Wed, 27 Mar 2024 00:59:17 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: HIT
    Age: 1437
    Server: cloudflare
    CF-RAY: 86ab6fd89ec7385e-LHR
  • 104.20.67.143:443
    https://pastebin.com/raw/ubFNTPjt
    tls, http
    e0647ad5202ed4a2b09a10b71e185f52.exe
    939 B
    4.5kB
    10
    8

    HTTP Request

    GET https://pastebin.com/raw/ubFNTPjt

    HTTP Response

    404
  • 8.8.8.8:53
    pastebin.com
    dns
    e0647ad5202ed4a2b09a10b71e185f52.exe
    58 B
    106 B
    1
    1

    DNS Request

    pastebin.com

    DNS Response

    104.20.67.143
    104.20.68.143
    172.67.34.170

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarB062.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\e0647ad5202ed4a2b09a10b71e185f52.exe

    Filesize

    136KB

    MD5

    0a7799ae33a527c7778b3e080d1b41a4

    SHA1

    1cbd82ea73399887f536fca2716fe6e2424cd734

    SHA256

    46a509023ef1f317a6fde20d5dd32e7bf3c2a123d21ee0ecb44e215781f7dffa

    SHA512

    6e7c9d3564cdf14e33eab8fc9999ea91b57f263a1dff7c9439d8200c078895e3d37766772ced41105b2c689fc89ac42fe31ad3d25e2783d99cb6145e9b146a07

  • \Users\Admin\AppData\Local\Temp\e0647ad5202ed4a2b09a10b71e185f52.exe

    Filesize

    1.0MB

    MD5

    a26373892313b8a97a8f90382cedaf13

    SHA1

    03b2f24173dbaf549a5ae82e5ab18cb2e32125ad

    SHA256

    85b0114592f820944c87193450aca2dc49f96a30d9e3a76fc03ed763584a7e2c

    SHA512

    6b153486282bfe458e532d8d4d2a15db65ebb013057b957b08542742144aba7fc143270fd20d349d13986a00ec0e8f75b638ca238289129d87a0f3c5afa236a3

  • memory/2440-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2440-2-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2440-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2440-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2440-12-0x0000000002D40000-0x0000000002DA6000-memory.dmp

    Filesize

    408KB

  • memory/2996-16-0x0000000000380000-0x00000000003E6000-memory.dmp

    Filesize

    408KB

  • memory/2996-24-0x0000000001470000-0x00000000014CF000-memory.dmp

    Filesize

    380KB

  • memory/2996-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2996-80-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2996-85-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2996-86-0x0000000009680000-0x00000000096BC000-memory.dmp

    Filesize

    240KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.