Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2025, 02:47 UTC

General

  • Target

    6b5df7909e349ce04b4ec2e3b02bd0f3c1f49173d7d1485946e4c4e9194e88ae.dll

  • Size

    1.2MB

  • MD5

    f9f252d2dfbb062e1ccc62df48e3b531

  • SHA1

    a3e0035cef91cf65ca9e447e408895993b371c0c

  • SHA256

    6b5df7909e349ce04b4ec2e3b02bd0f3c1f49173d7d1485946e4c4e9194e88ae

  • SHA512

    39f29169b8859edd5ead59ce5478f3044e127177b238d911f77c0cbab75a216dd2ee10c04c350098f9738815854af3fdce11fa675201364e75df0bf691294973

  • SSDEEP

    24576:/O/VvL5QafhQsnoXyaoMferXQ5rnxQBuLv8Y4fSffUO9l:S5nfhQzOMoA5rnxHv8BSUe

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b5df7909e349ce04b4ec2e3b02bd0f3c1f49173d7d1485946e4c4e9194e88ae.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Windows\system32\netsh.exe
      netsh wlan show profiles
      2⤵
      • Event Triggered Execution: Netsh Helper DLL
      • System Network Configuration Discovery: Wi-Fi Discovery
      PID:5012
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\227495264221_Desktop.zip' -CompressionLevel Optimal
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2420

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    8.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.153.16.2.in-addr.arpa
    IN PTR
    Response
    8.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-8deploystaticakamaitechnologiescom
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    167.173.78.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    167.173.78.104.in-addr.arpa
    IN PTR
    Response
    167.173.78.104.in-addr.arpa
    IN PTR
    a104-78-173-167deploystaticakamaitechnologiescom
  • flag-us
    DNS
    68.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    68.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    28.118.140.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.118.140.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 92.255.57.155:80
    rundll32.exe
    260 B
    5
  • 92.255.57.155:80
    rundll32.exe
    260 B
    5
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    8.153.16.2.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    8.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    167.173.78.104.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    167.173.78.104.in-addr.arpa

  • 8.8.8.8:53
    68.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    68.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    28.118.140.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    28.118.140.52.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    21.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    21.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\227495264221_Desktop.zip

    Filesize

    17KB

    MD5

    5d702653c0737c7b65051f683324dd8e

    SHA1

    08d3cc933a8114a84379ceb9654cc9cd73bb4092

    SHA256

    06dc4c52bcb479bc5b5612aba8ceb35d11c53faf4380d5dfbcb9ddf3feb43c9e

    SHA512

    24d8087c54d7ae6340e300cf0c91d4906410637de04d69ee422fc07d74e1ec2577fd8bf427f316d7969d1bd9655548c90a6bf0e507cb91b923cd20a530352169

  • C:\Users\Admin\AppData\Local\Temp\_Files_\ClearUnpublish.xlsx

    Filesize

    12KB

    MD5

    994251f6b80a766a35b9236cd37db1dd

    SHA1

    764c12ed7582e27745431e2f2fe221157038ec54

    SHA256

    56c542935e05ff8dd2c0a8bbe5b3b99c21625d78f0edc391952b50adec489042

    SHA512

    c0d65c7c0d0f6dec3e8a6291289df0ec6ee88dd55d1e582c814654f145f5bfde4a476276b648ee2b39fb5d6ec7a1198bde1d026a48f1ae861240abef1c8dab9f

  • C:\Users\Admin\AppData\Local\Temp\_Files_\WriteEdit.xlsx

    Filesize

    9KB

    MD5

    168b4ddd9f62fc431151721e0bb4760b

    SHA1

    337ec16c33b4671ca11debf89b3212b7a8215935

    SHA256

    4196d49aa8a3022350e1e75fc549be9f081537063a966734a04cf6f1a816a31e

    SHA512

    87c0614511b1d026660665aa08ab0b3814928a9b97244541ebf8659fb64de0cd0901a169e4cb717709a8249210c91728cbb4108f27ebddeacfd01a1a9b0ca508

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kyc2upzn.ln1.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2420-2-0x00007FF8273E3000-0x00007FF8273E5000-memory.dmp

    Filesize

    8KB

  • memory/2420-3-0x000002E46CAF0000-0x000002E46CB12000-memory.dmp

    Filesize

    136KB

  • memory/2420-13-0x00007FF8273E0000-0x00007FF827EA1000-memory.dmp

    Filesize

    10.8MB

  • memory/2420-14-0x00007FF8273E0000-0x00007FF827EA1000-memory.dmp

    Filesize

    10.8MB

  • memory/2420-15-0x000002E46CE80000-0x000002E46CE92000-memory.dmp

    Filesize

    72KB

  • memory/2420-16-0x000002E46CE70000-0x000002E46CE7A000-memory.dmp

    Filesize

    40KB

  • memory/2420-22-0x00007FF8273E0000-0x00007FF827EA1000-memory.dmp

    Filesize

    10.8MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.