Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 11:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
54cef68b48ded4fa94e54f164a4dd838894a200c2887c885d29474c998c5e2c8.dll
Resource
win7-20240903-en
General
-
Target
54cef68b48ded4fa94e54f164a4dd838894a200c2887c885d29474c998c5e2c8.dll
-
Size
542KB
-
MD5
1fed599b6716c7395cfe19002774dac5
-
SHA1
2dd268f89e179bdf68477660a51c77fe6e95e7eb
-
SHA256
54cef68b48ded4fa94e54f164a4dd838894a200c2887c885d29474c998c5e2c8
-
SHA512
ad4bd2c8b04cff498de9517481b5ffbc3c48d0842f2532ef8e6143773bceb49fbd70069b54c30a59affa8590f800ba8a2323284278ffda1e13db7629ba85dd5b
-
SSDEEP
12288:RHVfvJEwcONs7+c/PfiIw0hleWqnFlw6lF9TZFb9/w8YrA9r6Abyv:/JUONOXns0hUFw6dfb9grMr4
Malware Config
Signatures
-
Quasar family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 5076 rundll32.exe 10 5076 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5076 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 5076 4900 rundll32.exe 83 PID 4900 wrote to memory of 5076 4900 rundll32.exe 83 PID 4900 wrote to memory of 5076 4900 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54cef68b48ded4fa94e54f164a4dd838894a200c2887c885d29474c998c5e2c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54cef68b48ded4fa94e54f164a4dd838894a200c2887c885d29474c998c5e2c8.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request159.241.216.162.in-addr.arpaIN PTRResponse159.241.216.162.in-addr.arpaIN PTRunassigned162-216-241-159sprytnet
-
Remote address:8.8.8.8:53Request159.241.216.162.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
Remote address:208.95.112.1:80RequestGET /json/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Content-Length: 291
Access-Control-Allow-Origin: *
X-Ttl: 58
X-Rl: 43
-
Remote address:8.8.8.8:53Request241.66.18.2.in-addr.arpaIN PTRResponse241.66.18.2.in-addr.arpaIN PTRa2-18-66-241deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.66.18.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
912 B 640 B 14 11
-
380 B 600 B 5 3
HTTP Request
GET http://ip-api.com/json/HTTP Response
200
-
132 B 90 B 2 1
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
148 B 124 B 2 1
DNS Request
159.241.216.162.in-addr.arpa
DNS Request
159.241.216.162.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
140 B 133 B 2 1
DNS Request
241.66.18.2.in-addr.arpa
DNS Request
241.66.18.2.in-addr.arpa
-
142 B 95 B 2 1
DNS Request
1.112.95.208.in-addr.arpa
DNS Request
1.112.95.208.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
71.31.126.40.in-addr.arpa
DNS Request
71.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
241.150.49.20.in-addr.arpa
DNS Request
241.150.49.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
140 B 144 B 2 1
DNS Request
18.31.95.13.in-addr.arpa
DNS Request
18.31.95.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa