Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
ylyz.dll
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ylyz.dll
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
ylyz.dll
-
Size
332KB
-
MD5
01fdd1c8cc5e5c69f3d5507a25367263
-
SHA1
eb992300f7fd49d3723737a39782bd4c46b4e566
-
SHA256
23843640cfae43671a48b17dc4fe585a8e37e3767039f82448077c5b54694a57
-
SHA512
97b70cca528e34cb4a18e884169364d07a407a78bd5b25c436612c0316a954e818e51fe3c50fe41197da9972cfd5f6c5d3d3a3921654967784837459ffb3dac8
Score
10/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1124 1060 rundll32.exe 24 PID 1060 wrote to memory of 1124 1060 rundll32.exe 24 PID 1060 wrote to memory of 1124 1060 rundll32.exe 24 PID 1060 wrote to memory of 1124 1060 rundll32.exe 24 PID 1060 wrote to memory of 1124 1060 rundll32.exe 24 PID 1060 wrote to memory of 1124 1060 rundll32.exe 24 PID 1060 wrote to memory of 1124 1060 rundll32.exe 24 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 PID 1124 wrote to memory of 1108 1124 rundll32.exe 27 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1124 set thread context of 1108 1124 rundll32.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1108 msiexec.exe Token: SeSecurityPrivilege 1108 msiexec.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Exuhy = "regsvr32.exe /s C:\\Users\\Admin\\AppData\\Roaming\\Ywqohy\\olwe.dll" msiexec.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ylyz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ylyz.dll,#12⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1124 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
PID:1108
-
-