Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 16:51 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Polaris2.0.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Polaris2.0.exe
Resource
win10v2004-20240426-en
3 signatures
150 seconds
General
-
Target
Polaris2.0.exe
-
Size
105KB
-
MD5
273a2d3366f862ec220c1eeeeff6988f
-
SHA1
bb25ec9ea5aa008d5cab2626edb4442eeb83aa27
-
SHA256
baca4336a891b4987224c6e73ac3899c1dd19fe395a12d882d13a280c6b815e2
-
SHA512
7c3294547e4bff31111bd12963568d5344dcdb622ac007f59482119abcb9059f21ed8fc720623991745096cc5b1c203dd9cba40374f3945d82d35306f812cf24
-
SSDEEP
3072:BEpdAcvWCofYgEXwq1KzFOyOjSvod6ZK63Nryjgq+Ie4fVkNP:C3AcZJdyZfuVkNP
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Polaris2.0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1636 Polaris2.0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4944 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4944 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Polaris2.0.exe"C:\Users\Admin\AppData\Local\Temp\Polaris2.0.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
PID:1636
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x520 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4944
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request64.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.244.122.92.in-addr.arpaIN PTRResponse9.244.122.92.in-addr.arpaIN PTRa92-122-244-9deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request50.244.122.92.in-addr.arpaIN PTRResponse50.244.122.92.in-addr.arpaIN PTRa92-122-244-50deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.173.189.20.in-addr.arpaIN PTRResponse
No results found
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
64.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
9.244.122.92.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
50.244.122.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
8.173.189.20.in-addr.arpa