Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 01:18 UTC
Static task
static1
Behavioral task
behavioral1
Sample
a5427ce0bc58d022275ed267ed50ebcd4fe01c61e21b2d3bf2e69f8ffe388b31.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5427ce0bc58d022275ed267ed50ebcd4fe01c61e21b2d3bf2e69f8ffe388b31.exe
Resource
win10v2004-20240226-en
General
-
Target
a5427ce0bc58d022275ed267ed50ebcd4fe01c61e21b2d3bf2e69f8ffe388b31.exe
-
Size
781KB
-
MD5
b445ffd2caedb910b378ac5674e2dbb8
-
SHA1
5d0ac54a89a5588d7b90f1a03ec2b3ecd527fd90
-
SHA256
a5427ce0bc58d022275ed267ed50ebcd4fe01c61e21b2d3bf2e69f8ffe388b31
-
SHA512
ed4147bde0a0bedc5f212bc5ef455732fd3a1472847c5a41ed048a3bf363c01f2a98cf9a27326704e233bfc1cca869d9e195bdb807e4c7391bd39d6b454ca2da
-
SSDEEP
12288:zJB0lh5aILwtFPCfmARg9Gn/Evr0qxcvC5aqKBdYicRsHR0tz:zQ5aILMCfmARgbvyvC5lKXhtR4
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2964 a5427ce0bc58d022275ed267ed50ebcd4fe01c61e21b2d3bf2e69f8ffe388b31.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5427ce0bc58d022275ed267ed50ebcd4fe01c61e21b2d3bf2e69f8ffe388b31.exe"C:\Users\Admin\AppData\Local\Temp\a5427ce0bc58d022275ed267ed50ebcd4fe01c61e21b2d3bf2e69f8ffe388b31.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:1408
Network
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.197.17.2.in-addr.arpaIN PTRResponse240.197.17.2.in-addr.arpaIN PTRa2-17-197-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request23.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.142.211.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request140.71.91.104.in-addr.arpaIN PTRResponse140.71.91.104.in-addr.arpaIN PTRa104-91-71-140deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request123.10.44.20.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
240.197.17.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
183.142.211.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
140.71.91.104.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
123.10.44.20.in-addr.arpa