Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2024, 11:26 UTC

General

  • Target

    6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe

  • Size

    2.7MB

  • MD5

    9572072cafd36a5b8f56f13dc9a9ff8e

  • SHA1

    b7a0107245abe3978cc08bc8cfa37a6663abd913

  • SHA256

    6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9

  • SHA512

    6b12667efe1de6948606b6cb562ba4fbcd13f5dff3e7f6a23914712cd265fea823116750eaacb2a68dfff6e49702151e7848d4f154fcaad988ea983fc362607b

  • SSDEEP

    24576:ssF6mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH81Z:fF6mw4gxeOw46fUbNecCCFbNecf

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe
    "C:\Users\Admin\AppData\Local\Temp\6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
      2⤵
      • Drops startup file
      • System Location Discovery: System Language Discovery
      PID:8
    • C:\Users\Admin\AppData\Local\Temp\6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe
      C:\Users\Admin\AppData\Local\Temp\6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Users\Admin\AppData\Local\Temp\6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe
        C:\Users\Admin\AppData\Local\Temp\6a04c973ca599edf122009cac5a32352b7bfe57f5b81132821f7aa9b2f241dd9.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2984
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        3⤵
          PID:636

    Network

    • flag-us
      DNS
      196.249.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      196.249.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      133.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      104.219.191.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.219.191.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      149.220.183.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      149.220.183.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      50.23.12.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      50.23.12.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.210.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.210.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      181.129.81.91.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      181.129.81.91.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      3.173.189.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      3.173.189.20.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      196.249.167.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      196.249.167.52.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      133.32.126.40.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      133.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      104.219.191.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      104.219.191.52.in-addr.arpa

    • 8.8.8.8:53
      149.220.183.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      149.220.183.52.in-addr.arpa

    • 8.8.8.8:53
      50.23.12.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      50.23.12.20.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      172.210.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.210.232.199.in-addr.arpa

    • 8.8.8.8:53
      181.129.81.91.in-addr.arpa
      dns
      72 B
      147 B
      1
      1

      DNS Request

      181.129.81.91.in-addr.arpa

    • 8.8.8.8:53
      3.173.189.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      3.173.189.20.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2984-19-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2984-31-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2984-24-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3504-7-0x00000000004E7000-0x0000000000513000-memory.dmp

      Filesize

      176KB

    • memory/3504-3-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3504-10-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3504-13-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3504-8-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3504-2-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3504-6-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3504-5-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3504-4-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3504-14-0x00000000004E7000-0x0000000000513000-memory.dmp

      Filesize

      176KB

    • memory/3504-15-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3504-25-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3504-9-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3504-27-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/4216-12-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/4216-0-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.