Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01/02/2022, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
d3255ed380e290f4992701d1c10a3f65580b5e0aff384ab4308a8202d71f38a8.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d3255ed380e290f4992701d1c10a3f65580b5e0aff384ab4308a8202d71f38a8.dll
Resource
win10v2004-en-20220112
General
-
Target
d3255ed380e290f4992701d1c10a3f65580b5e0aff384ab4308a8202d71f38a8.dll
-
Size
275KB
-
MD5
39cb3387dedf5568efeb8ae071e9006e
-
SHA1
9e9005fe8e8817c87e8f55bb5ba41f12ec7724b0
-
SHA256
d3255ed380e290f4992701d1c10a3f65580b5e0aff384ab4308a8202d71f38a8
-
SHA512
ef496ca7b6aaa85df502a6eccc7fa1758b9bcc14ec194b451660444b4d8e23c3e67353432a3d653bf3936f0cf18df2abe239e7b4e5adb6eb8260aea07c1ca299
Malware Config
Extracted
zloader
DLLobnova
cookiesfix
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
https://dsdjfhdsufudhjas.pro/gate.php
https://dsdjfhd9ddksaas.pro/gate.php
-
build_id
25
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 5 1696 msiexec.exe 7 1696 msiexec.exe 9 1696 msiexec.exe 11 1696 msiexec.exe 13 1696 msiexec.exe 15 1696 msiexec.exe 17 1696 msiexec.exe 19 1696 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idewedi = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Seiv\\idadvea.dll,DllRegisterServer" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1656 set thread context of 1696 1656 rundll32.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1696 msiexec.exe Token: SeSecurityPrivilege 1696 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1656 1636 rundll32.exe 27 PID 1636 wrote to memory of 1656 1636 rundll32.exe 27 PID 1636 wrote to memory of 1656 1636 rundll32.exe 27 PID 1636 wrote to memory of 1656 1636 rundll32.exe 27 PID 1636 wrote to memory of 1656 1636 rundll32.exe 27 PID 1636 wrote to memory of 1656 1636 rundll32.exe 27 PID 1636 wrote to memory of 1656 1636 rundll32.exe 27 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28 PID 1656 wrote to memory of 1696 1656 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3255ed380e290f4992701d1c10a3f65580b5e0aff384ab4308a8202d71f38a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3255ed380e290f4992701d1c10a3f65580b5e0aff384ab4308a8202d71f38a8.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-