Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/11/2024, 09:42 UTC

General

  • Target

    d39112c52f185ade7150f8b2f9b5ccc859d3acea9d9a0a6d2fb6e3b141acaac5.exe

  • Size

    1.2MB

  • MD5

    78d3d1c025b7a3ab8c1af4d4e0b271ba

  • SHA1

    c4f9ebe07b01ff0b25aa4e811c95b8fcc68344f7

  • SHA256

    d39112c52f185ade7150f8b2f9b5ccc859d3acea9d9a0a6d2fb6e3b141acaac5

  • SHA512

    caf21c6ac7b52c4f35f8d238db48510e4ca91eaa8cfed1175b3bb81e4bd45258b0afb490495d9f5ea9a633b72c8b8f252696c16f5ec269dd4b3e72411f8cfc8d

  • SSDEEP

    12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kf:OIbGD2JTu0GoZQDbGV6eH81kf

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d39112c52f185ade7150f8b2f9b5ccc859d3acea9d9a0a6d2fb6e3b141acaac5.exe
    "C:\Users\Admin\AppData\Local\Temp\d39112c52f185ade7150f8b2f9b5ccc859d3acea9d9a0a6d2fb6e3b141acaac5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Users\Admin\AppData\Local\Temp\d39112c52f185ade7150f8b2f9b5ccc859d3acea9d9a0a6d2fb6e3b141acaac5.exe
      "C:\Users\Admin\AppData\Local\Temp\d39112c52f185ade7150f8b2f9b5ccc859d3acea9d9a0a6d2fb6e3b141acaac5.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1716
    • C:\Windows\SysWOW64\diskperf.exe
      "C:\Windows\SysWOW64\diskperf.exe"
      2⤵
        PID:4692

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      217.106.137.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.106.137.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      88.210.23.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      88.210.23.2.in-addr.arpa
      IN PTR
      Response
      88.210.23.2.in-addr.arpa
      IN PTR
      a2-23-210-88deploystaticakamaitechnologiescom
    • flag-us
      DNS
      14.160.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      14.160.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      154.239.44.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      154.239.44.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      53.210.109.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      53.210.109.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      15.164.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.164.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      92.12.20.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      92.12.20.2.in-addr.arpa
      IN PTR
      Response
      92.12.20.2.in-addr.arpa
      IN PTR
      a2-20-12-92deploystaticakamaitechnologiescom
    • flag-us
      DNS
      83.210.23.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      83.210.23.2.in-addr.arpa
      IN PTR
      Response
      83.210.23.2.in-addr.arpa
      IN PTR
      a2-23-210-83deploystaticakamaitechnologiescom
    • flag-us
      DNS
      14.227.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      14.227.111.52.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      217.106.137.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      217.106.137.52.in-addr.arpa

    • 8.8.8.8:53
      88.210.23.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      88.210.23.2.in-addr.arpa

    • 8.8.8.8:53
      14.160.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      14.160.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      154.239.44.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      154.239.44.20.in-addr.arpa

    • 8.8.8.8:53
      53.210.109.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      53.210.109.20.in-addr.arpa

    • 8.8.8.8:53
      15.164.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      15.164.165.52.in-addr.arpa

    • 8.8.8.8:53
      92.12.20.2.in-addr.arpa
      dns
      69 B
      131 B
      1
      1

      DNS Request

      92.12.20.2.in-addr.arpa

    • 8.8.8.8:53
      83.210.23.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      83.210.23.2.in-addr.arpa

    • 8.8.8.8:53
      14.227.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      14.227.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1716-9-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1716-26-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1716-24-0x00000000004B0000-0x0000000000579000-memory.dmp

      Filesize

      804KB

    • memory/1716-13-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3456-3-0x00000000007A0000-0x00000000007A1000-memory.dmp

      Filesize

      4KB

    • memory/3456-4-0x0000000000400000-0x0000000000514000-memory.dmp

      Filesize

      1.1MB

    • memory/3456-5-0x00000000007A0000-0x00000000007A1000-memory.dmp

      Filesize

      4KB

    • memory/3456-0-0x0000000000400000-0x0000000000514000-memory.dmp

      Filesize

      1.1MB

    • memory/3456-22-0x0000000000400000-0x0000000000514000-memory.dmp

      Filesize

      1.1MB

    • memory/3456-1-0x0000000000400000-0x0000000000514000-memory.dmp

      Filesize

      1.1MB

    • memory/3456-2-0x0000000000400000-0x0000000000514000-memory.dmp

      Filesize

      1.1MB

    • memory/4692-14-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/4692-18-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/4692-16-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.