Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
9d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164.dll
Resource
win10v2004-20220812-en
General
-
Target
9d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164.dll
-
Size
29KB
-
MD5
608b48cb9671b72721f262a16e4bd86c
-
SHA1
a3989fcfe22f78e60367dc34140364d374bbb478
-
SHA256
9d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164
-
SHA512
ff01b77565baa6cd0aa24d6a824726f3705256f66419af1447093199be891048002bf97ec1c48b254eb66ae165dfee0216cf429dcf9aca92dca5b4193a52629d
-
SSDEEP
768:oPT0ZH76u/h3P58P/Kr7UYQhpNn2bAmjw:CT0V71R0khepN2s
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 964 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\yayaBSlI.dll,#1" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\yayaBSlI.dll rundll32.exe File created C:\Windows\SysWOW64\yayaBSlI.dll rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A30B575B-0E87-446B-BB58-DD22D0F61DE0} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A30B575B-0E87-446B-BB58-DD22D0F61DE0}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A30B575B-0E87-446B-BB58-DD22D0F61DE0}\InprocServer32\ = "C:\\Windows\\SysWow64\\yayaBSlI.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A30B575B-0E87-446B-BB58-DD22D0F61DE0}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe 1948 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 964 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 964 wrote to memory of 1948 964 rundll32.exe 27 PID 964 wrote to memory of 1948 964 rundll32.exe 27 PID 964 wrote to memory of 1948 964 rundll32.exe 27 PID 964 wrote to memory of 1948 964 rundll32.exe 27 PID 964 wrote to memory of 1948 964 rundll32.exe 27 PID 964 wrote to memory of 1948 964 rundll32.exe 27 PID 964 wrote to memory of 1948 964 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\yayaBSlI.dll,a3⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5608b48cb9671b72721f262a16e4bd86c
SHA1a3989fcfe22f78e60367dc34140364d374bbb478
SHA2569d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164
SHA512ff01b77565baa6cd0aa24d6a824726f3705256f66419af1447093199be891048002bf97ec1c48b254eb66ae165dfee0216cf429dcf9aca92dca5b4193a52629d
-
Filesize
29KB
MD5608b48cb9671b72721f262a16e4bd86c
SHA1a3989fcfe22f78e60367dc34140364d374bbb478
SHA2569d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164
SHA512ff01b77565baa6cd0aa24d6a824726f3705256f66419af1447093199be891048002bf97ec1c48b254eb66ae165dfee0216cf429dcf9aca92dca5b4193a52629d
-
Filesize
29KB
MD5608b48cb9671b72721f262a16e4bd86c
SHA1a3989fcfe22f78e60367dc34140364d374bbb478
SHA2569d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164
SHA512ff01b77565baa6cd0aa24d6a824726f3705256f66419af1447093199be891048002bf97ec1c48b254eb66ae165dfee0216cf429dcf9aca92dca5b4193a52629d
-
Filesize
29KB
MD5608b48cb9671b72721f262a16e4bd86c
SHA1a3989fcfe22f78e60367dc34140364d374bbb478
SHA2569d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164
SHA512ff01b77565baa6cd0aa24d6a824726f3705256f66419af1447093199be891048002bf97ec1c48b254eb66ae165dfee0216cf429dcf9aca92dca5b4193a52629d
-
Filesize
29KB
MD5608b48cb9671b72721f262a16e4bd86c
SHA1a3989fcfe22f78e60367dc34140364d374bbb478
SHA2569d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164
SHA512ff01b77565baa6cd0aa24d6a824726f3705256f66419af1447093199be891048002bf97ec1c48b254eb66ae165dfee0216cf429dcf9aca92dca5b4193a52629d
-
Filesize
29KB
MD5608b48cb9671b72721f262a16e4bd86c
SHA1a3989fcfe22f78e60367dc34140364d374bbb478
SHA2569d7030256950ab804ca430c3bf305f087dd41d5e1cf46c254d8357e1ded8d164
SHA512ff01b77565baa6cd0aa24d6a824726f3705256f66419af1447093199be891048002bf97ec1c48b254eb66ae165dfee0216cf429dcf9aca92dca5b4193a52629d