Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 18:57 UTC

General

  • Target

    5fea4accf954d411e291af8f3eed128cc6215af2a3bcc96957c256479e1c0968.dll

  • Size

    437KB

  • MD5

    c510a250ac6a33fd6b156ede8ad784a7

  • SHA1

    e10f1951e05f9bcba942ae1dbf6bd8e55e3e2370

  • SHA256

    5fea4accf954d411e291af8f3eed128cc6215af2a3bcc96957c256479e1c0968

  • SHA512

    40551bb731831f88ada01e3acc47690cd58e7b59064ee68db6d2199665b61c1108ea138097deeb13389117b74cee975477af1009f408cdcc3dc3dc8ad68712e0

  • SSDEEP

    6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6W9:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSn

Malware Config

Signatures

  • Detect PurpleFox Rootkit 2 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
        2⤵
          PID:4816
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
          2⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3468
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
          2⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2680
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\5fea4accf954d411e291af8f3eed128cc6215af2a3bcc96957c256479e1c0968.dll,#1
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\5fea4accf954d411e291af8f3eed128cc6215af2a3bcc96957c256479e1c0968.dll,#1
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2108

      Network

      • flag-us
        DNS
        www.qkjyaym.cn
        LocalServiceNetworkRestricted
        Remote address:
        8.8.8.8:53
        Request
        www.qkjyaym.cn
        IN A
        Response
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        154.239.44.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        154.239.44.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        71.31.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        71.31.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        97.17.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        97.17.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        149.220.183.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        149.220.183.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        26.165.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.165.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        26.165.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.165.165.52.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        26.165.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.165.165.52.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        15.164.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        15.164.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.134.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.134.221.88.in-addr.arpa
        IN PTR
        Response
        18.134.221.88.in-addr.arpa
        IN PTR
        a88-221-134-18deploystaticakamaitechnologiescom
      • flag-us
        DNS
        13.227.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        13.227.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        www.qkjyaym.cn
        LocalServiceNetworkRestricted
        Remote address:
        8.8.8.8:53
        Request
        www.qkjyaym.cn
        IN A
        Response
      • flag-us
        DNS
        3.173.189.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        3.173.189.20.in-addr.arpa
        IN PTR
        Response
      • 10.127.1.0:8088
        LocalServiceNetworkRestricted
      • 10.127.1.0:8088
        LocalServiceNetworkRestricted
      • 10.127.1.0:8088
        LocalServiceNetworkRestricted
      • 10.127.1.0:8088
        LocalServiceNetworkRestricted
      • 8.8.8.8:53
        www.qkjyaym.cn
        dns
        LocalServiceNetworkRestricted
        60 B
        124 B
        1
        1

        DNS Request

        www.qkjyaym.cn

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        154.239.44.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        154.239.44.20.in-addr.arpa

      • 8.8.8.8:53
        71.31.126.40.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        71.31.126.40.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        146 B
        144 B
        2
        1

        DNS Request

        95.221.229.192.in-addr.arpa

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        97.17.167.52.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        97.17.167.52.in-addr.arpa

      • 8.8.8.8:53
        149.220.183.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        149.220.183.52.in-addr.arpa

      • 8.8.8.8:53
        26.165.165.52.in-addr.arpa
        dns
        216 B
        146 B
        3
        1

        DNS Request

        26.165.165.52.in-addr.arpa

        DNS Request

        26.165.165.52.in-addr.arpa

        DNS Request

        26.165.165.52.in-addr.arpa

      • 8.8.8.8:53
        15.164.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        15.164.165.52.in-addr.arpa

      • 8.8.8.8:53
        18.134.221.88.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        18.134.221.88.in-addr.arpa

      • 8.8.8.8:53
        13.227.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        13.227.111.52.in-addr.arpa

      • 8.8.8.8:53
        www.qkjyaym.cn
        dns
        LocalServiceNetworkRestricted
        60 B
        124 B
        1
        1

        DNS Request

        www.qkjyaym.cn

      • 8.8.8.8:53
        3.173.189.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        3.173.189.20.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2108-0-0x0000000010000000-0x00000000100A6000-memory.dmp

        Filesize

        664KB

      • memory/2680-21-0x0000000076420000-0x0000000076510000-memory.dmp

        Filesize

        960KB

      • memory/2680-22-0x0000000010000000-0x00000000101A0000-memory.dmp

        Filesize

        1.6MB

      • memory/2680-54-0x0000000076420000-0x0000000076510000-memory.dmp

        Filesize

        960KB

      • memory/3468-2-0x0000000000400000-0x0000000000543000-memory.dmp

        Filesize

        1.3MB

      • memory/3468-7-0x0000000000400000-0x0000000000543000-memory.dmp

        Filesize

        1.3MB

      • memory/3468-9-0x0000000000400000-0x0000000000543000-memory.dmp

        Filesize

        1.3MB

      • memory/3468-8-0x0000000000400000-0x0000000000543000-memory.dmp

        Filesize

        1.3MB

      • memory/3468-4-0x0000000000400000-0x0000000000543000-memory.dmp

        Filesize

        1.3MB

      • memory/3468-1-0x0000000000400000-0x0000000000543000-memory.dmp

        Filesize

        1.3MB

      • memory/3468-11-0x0000000076443000-0x0000000076444000-memory.dmp

        Filesize

        4KB

      • memory/3468-24-0x0000000010000000-0x00000000101A0000-memory.dmp

        Filesize

        1.6MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.