Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 01:12 UTC

General

  • Target

    b7abf1fad5b898b5d54a54571e3b2890N.exe

  • Size

    1.6MB

  • MD5

    b7abf1fad5b898b5d54a54571e3b2890

  • SHA1

    95b4dcee4b247c831e845b784be651b0dc194638

  • SHA256

    6b16fd76e7286ae01419766ccd8e87ff5a3767b7d2c344add605125a8ce68603

  • SHA512

    ea431bc0d7282fbc94762be49a63f2d3b3a28c113bdcdb0f87945d7350ca8f5575dcc7a41e3c94653d23923844624709627bda052057ee7f295cbafb5141e19c

  • SSDEEP

    49152:k3FvTMFQW5cAFcICbgtWl4mrbYE+3Mq0deC76CHdRyD:GFvoGAZCUWl4mrE9SQC76CHdRyD

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe
    "C:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe
      C:\Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      PID:1960

Network

  • flag-us
    DNS
    pastebin.com
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.4.235
    pastebin.com
    IN A
    104.20.3.235
    pastebin.com
    IN A
    172.67.19.24
  • flag-us
    GET
    https://pastebin.com/raw/AqndxJKK
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    Remote address:
    104.20.4.235:443
    Request
    GET /raw/AqndxJKK HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Thu, 22 Aug 2024 01:12:35 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: EXPIRED
    Server: cloudflare
    CF-RAY: 8b6efed2aa450691-LHR
  • flag-us
    DNS
    c.pki.goog
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    Remote address:
    8.8.8.8:53
    Request
    c.pki.goog
    IN A
    Response
    c.pki.goog
    IN CNAME
    pki-goog.l.google.com
    pki-goog.l.google.com
    IN A
    216.58.214.163
  • flag-fr
    GET
    http://c.pki.goog/r/gsr1.crl
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    Remote address:
    216.58.214.163:80
    Request
    GET /r/gsr1.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: c.pki.goog
    Response
    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
    Cross-Origin-Resource-Policy: cross-origin
    Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
    Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
    Content-Length: 1739
    X-Content-Type-Options: nosniff
    Server: sffe
    X-XSS-Protection: 0
    Date: Thu, 22 Aug 2024 00:27:18 GMT
    Expires: Thu, 22 Aug 2024 01:17:18 GMT
    Cache-Control: public, max-age=3000
    Age: 2716
    Last-Modified: Mon, 08 Jul 2024 07:38:00 GMT
    Content-Type: application/pkix-crl
    Vary: Accept-Encoding
  • flag-fr
    GET
    http://c.pki.goog/r/r4.crl
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    Remote address:
    216.58.214.163:80
    Request
    GET /r/r4.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: c.pki.goog
    Response
    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
    Cross-Origin-Resource-Policy: cross-origin
    Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
    Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
    Content-Length: 436
    X-Content-Type-Options: nosniff
    Server: sffe
    X-XSS-Protection: 0
    Date: Thu, 22 Aug 2024 00:29:28 GMT
    Expires: Thu, 22 Aug 2024 01:19:28 GMT
    Cache-Control: public, max-age=3000
    Age: 2586
    Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
    Content-Type: application/pkix-crl
    Vary: Accept-Encoding
  • 104.20.4.235:443
    https://pastebin.com/raw/AqndxJKK
    tls, http
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    1.0kB
    4.5kB
    9
    9

    HTTP Request

    GET https://pastebin.com/raw/AqndxJKK

    HTTP Response

    404
  • 216.58.214.163:80
    http://c.pki.goog/r/r4.crl
    http
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    818 B
    5.1kB
    10
    7

    HTTP Request

    GET http://c.pki.goog/r/gsr1.crl

    HTTP Response

    200

    HTTP Request

    GET http://c.pki.goog/r/r4.crl

    HTTP Response

    200
  • 8.8.8.8:53
    pastebin.com
    dns
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    58 B
    106 B
    1
    1

    DNS Request

    pastebin.com

    DNS Response

    104.20.4.235
    104.20.3.235
    172.67.19.24

  • 8.8.8.8:53
    c.pki.goog
    dns
    b7abf1fad5b898b5d54a54571e3b2890N.exe
    56 B
    107 B
    1
    1

    DNS Request

    c.pki.goog

    DNS Response

    216.58.214.163

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\b7abf1fad5b898b5d54a54571e3b2890N.exe

    Filesize

    1.6MB

    MD5

    a3e8d868361dbf6bb0fe441efbb95bd5

    SHA1

    a9aa51fc789f337d20a9f2dc86d10f0a7eb1247f

    SHA256

    2f213b408a6f0160ac488960bf38df052c418c84163439b0d96a0ecc1b5e298e

    SHA512

    78c0b1f7e2bdf61c8efe35a8095667af857a009d8d56f2c566fec1eb81223bd0b99e1a8f28cfa984f19b8ec58d846023fb3fa4b742d90328dbc45615faf21f9f

  • memory/624-0-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/624-7-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/1960-9-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/1960-10-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/1960-16-0x0000000002F10000-0x0000000003002000-memory.dmp

    Filesize

    968KB

  • memory/1960-38-0x000000000D8C0000-0x000000000D963000-memory.dmp

    Filesize

    652KB

  • memory/1960-32-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1960-39-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.