Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 23:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe
Resource
win10v2004-20240226-en
General
-
Target
88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe
-
Size
3.8MB
-
MD5
1850c1568c050d43c151f33e21bd9845
-
SHA1
fe38252bc5e059b57cb86cba13a51fe63dbbe44c
-
SHA256
88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4
-
SHA512
ac4e5c8889e89fad5336cdd964397d7dbd04725926376a70549cfdd10ae825024222fd9fa679c9b95b54ddf6f8c180e04c40679ed4f504180f8c20d48470124e
-
SSDEEP
98304:S98oB054pnlAlOeOONTw43gi67Q5iryIRl0xlvJOtBaqf:S98356CXT870oHzKAaqf
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4964 88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe 4964 88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe 4964 88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe"C:\Users\Admin\AppData\Local\Temp\88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:4964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4264 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:3484
Network
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request91.90.14.23.in-addr.arpaIN PTRResponse91.90.14.23.in-addr.arpaIN PTRa23-14-90-91deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requests.ludashi.comIN AResponses.ludashi.comIN A47.117.76.6
-
Remote address:8.8.8.8:53Requests.ludashi.comIN A
-
Remote address:8.8.8.8:53Requestzhushou.ludashi.comIN AResponsezhushou.ludashi.comIN A120.27.83.10
-
Remote address:8.8.8.8:53Requestzhushou.ludashi.comIN A
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.142.211.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestchromewebstore.googleapis.comIN AResponsechromewebstore.googleapis.comIN A142.250.187.202chromewebstore.googleapis.comIN A142.250.187.234chromewebstore.googleapis.comIN A142.250.178.10chromewebstore.googleapis.comIN A172.217.16.234chromewebstore.googleapis.comIN A142.250.200.10chromewebstore.googleapis.comIN A142.250.200.42chromewebstore.googleapis.comIN A216.58.201.106chromewebstore.googleapis.comIN A216.58.204.74chromewebstore.googleapis.comIN A216.58.213.10chromewebstore.googleapis.comIN A216.58.212.202chromewebstore.googleapis.comIN A216.58.212.234chromewebstore.googleapis.comIN A172.217.169.74chromewebstore.googleapis.comIN A172.217.169.42chromewebstore.googleapis.comIN A142.250.179.234chromewebstore.googleapis.comIN A142.250.180.10
-
Remote address:8.8.8.8:53Requestchromewebstore.googleapis.comIN UnknownResponse
-
Remote address:8.8.8.8:53Request202.187.250.142.in-addr.arpaIN PTRResponse202.187.250.142.in-addr.arpaIN PTRlhr25s33-in-f101e100net
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request123.10.44.20.in-addr.arpaIN PTRResponse
-
120.27.83.10:80zhushou.ludashi.com88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe260 B 5
-
260 B 5
-
260 B 5
-
2.0kB 7.9kB 16 17
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
91.90.14.23.in-addr.arpa
-
118 B 75 B 2 1
DNS Request
s.ludashi.com
DNS Request
s.ludashi.com
DNS Response
47.117.76.6
-
8.8.8.8:53zhushou.ludashi.comdns88aed89c6ab9c640c79069ff683d3f80bfd9e464c61dd045c524ea643226feb4.exe130 B 81 B 2 1
DNS Request
zhushou.ludashi.com
DNS Request
zhushou.ludashi.com
DNS Response
120.27.83.10
-
71 B 157 B 1 1
DNS Request
71.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
183.142.211.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
75 B 315 B 1 1
DNS Request
chromewebstore.googleapis.com
DNS Response
142.250.187.202142.250.187.234142.250.178.10172.217.16.234142.250.200.10142.250.200.42216.58.201.106216.58.204.74216.58.213.10216.58.212.202216.58.212.234172.217.169.74172.217.169.42142.250.179.234142.250.180.10
-
75 B 132 B 1 1
DNS Request
chromewebstore.googleapis.com
-
74 B 113 B 1 1
DNS Request
202.187.250.142.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
123.10.44.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
862KB
MD5ab00bed7cb2b7a8290e247fc34aaa5ff
SHA1d6014e2920d9b587a8e12ae1ba0f1e1fc9edffa8
SHA256ceffaedc050688e8dcc11ec30b703c63fefbfcf479558604fdb0ea42bcb497c0
SHA512fbe3bf5e142d689bb15d05503fcf5c807aad5bcb99a02dc99590589ee66f7942a0d8365d470041972212dbdf9c232ab4bbab25e79d7bcd43f001a95d9012cca6
-
Filesize
1.0MB
MD5b902e3ce824b63d3220bff0150097f83
SHA1efb511c687b1376b683cac4dfe26e044535aa8d3
SHA256bc19ccc142de96f79288a7edd5468b5e9a96a35a64c888a6e9a9733933c4ae51
SHA512ace3714e3d5c1409636478564c4ea1828c97cbeacea0e1ab95ec353e898bafcef0c682c780cbfa49589a480d36f0962c805508f4df1b430efb5955c9290b9656
-
Filesize
234KB
MD5cd03029957ebc78c0ca7a6c02a9ca846
SHA10044114b8073781479044f0294701be9611be2ac
SHA256139fdd92e6ddf1aac0761a68502b374daa32e82039621018511dc491ed9b4048
SHA51214c641cb9536def0ddc1969d50b97b83a23017c97373e3ad74d3fbf9825ac81f3fdf8169281c8ad4cebd45d9c9ae05f752d553ba4653e620889b274479cb7c32
-
Filesize
238KB
MD58786d469338c30e0ba9fedfc62bd5197
SHA15fb12028ceae9772f938e1b98b699f0e02e32718
SHA256beeaf8b72f7008e9adabacfcd85e32a50747a0dfb5c86802aeb973bd1f5c3d2f
SHA5125db1e5b78e62cda81a63e8e712e720f87a7c7a539237a55a9098c076f9fb4e0b5adb83383c23657b4ccc90c117e55e3946a399cdf3d15cb94444b203d9d6c45c
-
Filesize
2.0MB
MD5cc7b7a2d031fbef005b82bc5221e6046
SHA161b9cf646825c37e5262ab5b2ecc755d72770393
SHA25628f4e42556497b05a017309c69c7e62683a043ab1c452170056a1b5f77175633
SHA512ec67289b40e88acb946c18890e40e53322b386ce17c351c5fbbebccae84b6d16c2df79ebe79a143d1276101151544aa24a65bdd3101cfd096390034aa70d3e29