Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 19:09 UTC

General

  • Target

    01e0379caa88a56f130a6a53efc07f1eeff553fb805490869703aae50af99ef9.exe

  • Size

    112KB

  • MD5

    1ae33f07393620a97cba69ccb379b46a

  • SHA1

    46f3190bd736e151225efcbf231d75853c79bdbc

  • SHA256

    01e0379caa88a56f130a6a53efc07f1eeff553fb805490869703aae50af99ef9

  • SHA512

    ea9ce074a57a078f017a9a35933bfeaed04f84b78b02f9915387f368b93e511498c5c8fe7c894b77256eee06e8eac9121f9626ca580e71d9e5129561528e96fb

  • SSDEEP

    1536:/Wy2Nwx6QzlpuLogVczfA0QD5+bbNqnKVNzXWy2Nwx0Wy2NwxPNz:CAEDVchQFmP0

Malware Config

Extracted

Family

guloader

C2

http://mtspsmjeli.sch.id/cl/XP_remcos%202021_HzUYr10.bin

xor.base64
1
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

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e0379caa88a56f130a6a53efc07f1eeff553fb805490869703aae50af99ef9.exe
    "C:\Users\Admin\AppData\Local\Temp\01e0379caa88a56f130a6a53efc07f1eeff553fb805490869703aae50af99ef9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2904

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    71.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    71.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    167.173.78.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    167.173.78.104.in-addr.arpa
    IN PTR
    Response
    167.173.78.104.in-addr.arpa
    IN PTR
    a104-78-173-167deploystaticakamaitechnologiescom
  • flag-us
    DNS
    217.106.137.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.106.137.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    96.252.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    96.252.19.2.in-addr.arpa
    IN PTR
    Response
    96.252.19.2.in-addr.arpa
    IN PTR
    a2-19-252-96deploystaticakamaitechnologiescom
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    23.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.236.111.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    73.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    73.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    71.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    71.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    167.173.78.104.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    167.173.78.104.in-addr.arpa

  • 8.8.8.8:53
    217.106.137.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    217.106.137.52.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    96.252.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    96.252.19.2.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    23.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    23.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2904-2-0x00000000001C0000-0x00000000001CC000-memory.dmp

    Filesize

    48KB

  • memory/2904-3-0x00000000001C0000-0x00000000001CC000-memory.dmp

    Filesize

    48KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.