Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 19:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe
Resource
win10v2004-20240802-en
General
-
Target
1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe
-
Size
205KB
-
MD5
f4b030d8f06fcdeab6dbc5a8d90ea949
-
SHA1
c433438398b9dc5644dc5244255b592098069d8e
-
SHA256
1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96
-
SHA512
7de46b5fa25dac43206df4b468cb3773828e46d3c38945d0eae49735812ac8e4974d53093f59333cd7f4d689887bf105df0a53d0c76a80b131a77b0137de2702
-
SSDEEP
3072:0IXqry+d3DxQcv7zhWPk65Ui8BhmqjNj8DCUNUO42YwHdKpUUzE0mu87Gw:dQCcv7Mk6bgL5jMCeU3dRCUI0mu8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4164 1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2908 4164 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4164 1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe"C:\Users\Admin\AppData\Local\Temp\1cf620b5f6a51170f40e8ecf35dfc70b643a170140a3f87c0a79fb946d6ace96.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 7162⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4164 -ip 41641⤵PID:1300
Network
-
Remote address:8.8.8.8:53Requestdoubleclick.comIN AResponsedoubleclick.comIN A216.58.201.110
-
Remote address:8.8.8.8:53Requesttudou.comIN AResponsetudou.comIN A106.11.43.246
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request108.11.19.2.in-addr.arpaIN PTRResponse108.11.19.2.in-addr.arpaIN PTRa2-19-11-108deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
61 B 77 B 1 1
DNS Request
doubleclick.com
DNS Response
216.58.201.110
-
55 B 71 B 1 1
DNS Request
tudou.com
DNS Response
106.11.43.246
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
108.11.19.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b503f151c4fe95f2f2ffcaf97f746dd1
SHA1523db101958241c31c2ef9c6b069724984878852
SHA256b4e71f48a336443a64ba38079714b607072e10f81365793b5d710ed65cb44564
SHA512ee0abce32c2d1a08eec76e0b0c44f358881e08576802e65df3252c6008a24791ba9acf2af9d3ccf9b74482c575afbdcf5510ee4860597d01e5f4fc841b00e489