Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 16:55 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Andromeda BY @STRANGEMALWARE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Andromeda BY @STRANGEMALWARE.exe
Resource
win10v2004-20240802-en
General
-
Target
Andromeda BY @STRANGEMALWARE.exe
-
Size
11.7MB
-
MD5
2d74c0773274a5a26452a58597b71dae
-
SHA1
eb55c987262efad46d4ee1368c947d82defcb0b5
-
SHA256
151869c507cc328addc531df01b4b659d929df630e719267d2f52397a4d914c0
-
SHA512
0c0758fe0667bc62bbb09e8a34345cd4605e1c9e938c7aeb6e92583fd4616bf092898ce41e61184d5f8d055e6eede42e6803be21a4e1b077462d0d4c4339f4ba
-
SSDEEP
196608:WzIuGN2e2/PEIr9dpoKjT+uwVkSWO2t0c+gWzs634rS0gQfx+vD7clrfj1Y:WFA2JnjrpoKjTB+HWORcxWQVrSkAgl/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Andromeda BY @STRANGEMALWARE.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 Andromeda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4188 wrote to memory of 2396 4188 Andromeda BY @STRANGEMALWARE.exe 82 PID 4188 wrote to memory of 2396 4188 Andromeda BY @STRANGEMALWARE.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Andromeda BY @STRANGEMALWARE.exe"C:\Users\Admin\AppData\Local\Temp\Andromeda BY @STRANGEMALWARE.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\Andromeda.exe"C:\Users\Admin\AppData\Local\Temp\Andromeda.exe"2⤵
- Executes dropped EXE
PID:2396
-
Network
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request25.140.123.92.in-addr.arpaIN PTRResponse25.140.123.92.in-addr.arpaIN PTRa92-123-140-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.143.123.92.in-addr.arpaIN PTRResponse240.143.123.92.in-addr.arpaIN PTRa92-123-143-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
25.140.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
73.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
28.118.140.52.in-addr.arpa
DNS Request
28.118.140.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
240.143.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.0MB
MD5d19bf0e88eee53cd54800477fbe91963
SHA13f701c190c220d804eb5c7cbd39e74c3100c5774
SHA25670bfdbe3723e37ba0797e936a5d8c17ff3df7da64a4a84e6ac2f5270c37db2db
SHA51287975d5a36504a356fdb04f4bb8fe7e78344e886ca68de1c482a2d6424976fba60418d6e0457b5ca6efa7c4788d583a1f4f365152f70260946a39a6319ea2f2c