Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 12:31 UTC

General

  • Target

    0f96b6ff39e9735160f659fd11064c90N.exe

  • Size

    445KB

  • MD5

    0f96b6ff39e9735160f659fd11064c90

  • SHA1

    9baba92f29f43e213603ad901120bd45361e4cbd

  • SHA256

    97097afeb0e82129d56f366cf953960d3d61e172d1138716e2c2f59a9c6958ff

  • SHA512

    28c4af64c4772b94eb77e1a9c7676281b195a2ed3520c9fafaf95366d42ad3cc0187b36a059fcd35c065042656da03e3a8a1666072ea7cfdbfd09fbc2f38ca70

  • SSDEEP

    12288:HnVF3cnvEy9uTk4FF1g38Hx1iCJXOyC1aNJjrlIpGPyR:Hnz3c79uTk4rH1fiaNhRIpGPyR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f96b6ff39e9735160f659fd11064c90N.exe
    "C:\Users\Admin\AppData\Local\Temp\0f96b6ff39e9735160f659fd11064c90N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\mf.exe
      C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\mf.exe "C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\inetc.dll"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1796
    • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\ef.exe
      C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\ef.exe "C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\inetc.dll" -111
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4576

Network

  • flag-us
    DNS
    154.239.44.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    154.239.44.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    www.powerpackdl.com
    0f96b6ff39e9735160f659fd11064c90N.exe
    Remote address:
    8.8.8.8:53
    Request
    www.powerpackdl.com
    IN A
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    23.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    www.powerpackdl.com
    0f96b6ff39e9735160f659fd11064c90N.exe
    Remote address:
    8.8.8.8:53
    Request
    www.powerpackdl.com
    IN A
    Response
  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    103.169.127.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    103.169.127.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    217.135.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.135.221.88.in-addr.arpa
    IN PTR
    Response
    217.135.221.88.in-addr.arpa
    IN PTR
    a88-221-135-217deploystaticakamaitechnologiescom
  • 52.111.236.23:443
    322 B
    7
  • 8.8.8.8:53
    154.239.44.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    154.239.44.20.in-addr.arpa

  • 8.8.8.8:53
    www.powerpackdl.com
    dns
    0f96b6ff39e9735160f659fd11064c90N.exe
    65 B
    138 B
    1
    1

    DNS Request

    www.powerpackdl.com

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    23.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    23.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    www.powerpackdl.com
    dns
    0f96b6ff39e9735160f659fd11064c90N.exe
    65 B
    138 B
    1
    1

    DNS Request

    www.powerpackdl.com

  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    217 B
    305 B
    3
    2

    DNS Request

    196.249.167.52.in-addr.arpa

    DNS Request

    21.236.111.52.in-addr.arpa

    DNS Request

    21.236.111.52.in-addr.arpa

  • 8.8.8.8:53
    103.169.127.40.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    103.169.127.40.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    217.135.221.88.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    217.135.221.88.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\BaseConvert.dll

    Filesize

    48KB

    MD5

    d0419b6814f1b8e12b7b70616fedd0c7

    SHA1

    ef5fcbc2fa3623be8cf82def59a696bf946777ec

    SHA256

    14a4c7d96d87cb23038d688e80919d727f0cdb3b51859115f14c0af3248f109c

    SHA512

    d95cf9e3ef07154c83d26d9c57e3d7096f9cd8700aadf72c2e6b33264e46cd6314e072e9f11529431d484d4856f64c611b07c7bbd2bdb197ff593743a1ce1a34

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\Dialer.dll

    Filesize

    3KB

    MD5

    068ba6a2cece65f680895ea627f71e39

    SHA1

    27070d0fa949a80360426f37b3dfe9eaa0ed66f4

    SHA256

    ef649d2b3daed72b0778ab6b3f22a02e288fd009cf9e7e76eb1991451e580f82

    SHA512

    adf99b31790694d8ad02c56b1cb7c9dadeac49d492225a2d297654bfcd617f3afad23990d1d695fba03af1c355456e2e7c3e972eaa9b5ab1770bbb6eef0e733f

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\GetVersion.dll

    Filesize

    9KB

    MD5

    225f776172f1baccd2721a6e5d512b36

    SHA1

    2dbbc86f7b0285682880a627b56a75de09f4bed6

    SHA256

    ecfcbe30f5b248673f9cbebb734b9981ed14b06380ea787c563d67b30e2d069e

    SHA512

    4b99a5ac68122501a5913cf54bd3ae99d851d57656b0e136980122739cceef739fa2d5ea097f2442068b9489a4c25ea0884653c41d85f27f25996792bf6c21bb

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\Math.dll

    Filesize

    66KB

    MD5

    b140459077c7c39be4bef249c2f84535

    SHA1

    c56498241c2ddafb01961596da16d08d1b11cd35

    SHA256

    0598f7d83db44929b7170c1285457b52b4281185f63ced102e709bf065f10d67

    SHA512

    fbcb19a951d96a216d73b6b3e005338bbb6e11332c6cc8c3f179ccd420b4db0e5682dc4245bd120dcb67bc70960eab368e74c68c7c165a485a12a7d0d8a00328

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\ef.exe

    Filesize

    2KB

    MD5

    b8a00d99534bf83442b20b2474b767cf

    SHA1

    505d3f6591db0f87a73a0ac820cc2eba5171cfff

    SHA256

    cc6d58b72d806d7f314d31fbea1fd3b72708b2f9dd6d7203e12cf0e076337af6

    SHA512

    75df70621957af1bb2c072ca76cd6f9c5cd92d11e54691daa87d37c0c8bdad5979f8679b49e3e5fc5aa83081ef7b85e6b46393a0877520583d7cca43874ebbd5

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\inetc.dll.out

    Filesize

    19KB

    MD5

    e93d89074477fec8889ebac9d62b5c39

    SHA1

    efd9720cbfaad9422a7861df1de9a62ade2f01ab

    SHA256

    5d4a0d7b0ffc7c66ed1c82f9a1113171144ce8b4e13b1d32a63633b903681e7f

    SHA512

    e6b208739e9a3c555b7a652a05950e375732352ace80454b50d6f9fd7d39942827ef4c86ed8e707361b299d7a0eaccf368be50eb337739da956537242072f488

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\inetc.dll.out

    Filesize

    19KB

    MD5

    63cba29ea4625660c23cad9e922989f5

    SHA1

    54d6113a68222084ffec8e767a755c2d645b26c1

    SHA256

    a2a76f7920005aa914877f2d7e7674e871b4884e17bf34fdf70471bc8fecd1f0

    SHA512

    6dea4fede42dd70c07ebc77ad447b83a05083a9086c79ebacd20740a0924dab2f744c6f5da991ff507a345e24f6565f4a5242a533ae669d7fd308868868de653

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\inetc.dll.out0

    Filesize

    9KB

    MD5

    9e58ede648d8d1440df0837ed5876e4d

    SHA1

    0752f706596d3fc29efab8b08ebe68dd45ad8d76

    SHA256

    9587850fc6e0cfee023d884e69418219f00726d6d4b029f7d1172d85ec3bae0a

    SHA512

    35222bf5fa64828dfccd4676d6d17c2e3e9f8707e9d2edfb1dde2bb0ac5e0d8cd0f13c4fc5130a8701c1456c1fd0efad2bc5f139f80961f897d585eb1de5ec83

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\inetc.dll.out1

    Filesize

    9KB

    MD5

    189f6fe10648792200f5ba64343274a7

    SHA1

    5bb1c9d0b4eee3c64daff88707773f78b60be527

    SHA256

    3f13b20ce35f5893a03f2a823ad4287e52932dedd0a7a23c6f57384f43d583d9

    SHA512

    dda2f0a9376018c3a64340a1996395d4b86ef519cfc60a1a1f641376119662f969ede0155d47c78789a69520842a888eec0ba67fc94fe3e62e2fc8a914f15088

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\mf.exe

    Filesize

    2KB

    MD5

    224df7127c7ee69e67380eefc983a6ff

    SHA1

    236c342c5bd1f71725534d097fcd8538dd95aa56

    SHA256

    9ca35b84699aff2125cbe775c0731e69dad1d667d3ceec6db59c954dd9c83965

    SHA512

    c238c9fb0285eadd63e9f819b4aead95d88f312ef2a11749a879ba105a0c590e23e2def83f9cd8860744b9307bf12c71fbffbb482fa143e3b13b7934c23df80f

  • C:\Users\Admin\AppData\Local\Temp\nsu8435.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • memory/2288-36-0x0000000003BB0000-0x0000000003BBC000-memory.dmp

    Filesize

    48KB

  • memory/2288-44-0x0000000003CC0000-0x0000000003CDA000-memory.dmp

    Filesize

    104KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.