Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 15:35

General

  • Target

    33e41c9553f7f25de5b37f03c20e33a2d20465a07653ded2061fdb77607131f7.dll

  • Size

    200KB

  • MD5

    52aa10dee472357f557e80233c934493

  • SHA1

    52defda0020931021e5a7543af5ca5405c19341b

  • SHA256

    33e41c9553f7f25de5b37f03c20e33a2d20465a07653ded2061fdb77607131f7

  • SHA512

    a155c8f50a3ed087b777a7bb22c4021b264d03dc3bd747571cee9086996c65c7b235539cbdddfad388875d044468e16b8a0fd7b757378b4a930f8c60e42becea

  • SSDEEP

    6144:X1kmVe2cbY+idfSIfNuLP8qt0mtdHLhkDD:X1kmVJck+idfSIfMLEqGedKD

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\33e41c9553f7f25de5b37f03c20e33a2d20465a07653ded2061fdb77607131f7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\33e41c9553f7f25de5b37f03c20e33a2d20465a07653ded2061fdb77607131f7.dll,#1
      2⤵
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
        • Modifies registry class
        PID:5048
      • C:\Windows\SysWOW64\notepad.exe
        notepad.exe
        3⤵
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        PID:4788
      • C:\Windows\SysWOW64\notepad.exe
        notepad.exe
        3⤵
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://91.195.254.54/?c6c3281019e2dce921bb5cc23bf421c8
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4920
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4920 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 1004
          4⤵
          • Program crash
          PID:2736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 980
          4⤵
          • Program crash
          PID:2760
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:396
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:3448
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4180 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        PID:4216
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding
      1⤵
        PID:1396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4824 -ip 4824
        1⤵
          PID:2744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4824 -ip 4824
          1⤵
            PID:2740

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4756-133-0x00000000020D0000-0x0000000002101000-memory.dmp

            Filesize

            196KB

          • memory/4756-134-0x0000000002110000-0x0000000002146000-memory.dmp

            Filesize

            216KB

          • memory/4756-135-0x0000000002190000-0x00000000021C1000-memory.dmp

            Filesize

            196KB

          • memory/4756-148-0x0000000002190000-0x00000000021C1000-memory.dmp

            Filesize

            196KB

          • memory/4756-146-0x0000000002190000-0x00000000021C1000-memory.dmp

            Filesize

            196KB

          • memory/4756-145-0x0000000002110000-0x0000000002146000-memory.dmp

            Filesize

            216KB

          • memory/4788-138-0x0000000003FA0000-0x0000000003FD1000-memory.dmp

            Filesize

            196KB

          • memory/4788-139-0x0000000003FE0000-0x0000000004016000-memory.dmp

            Filesize

            216KB

          • memory/4788-140-0x0000000004060000-0x0000000004091000-memory.dmp

            Filesize

            196KB

          • memory/4824-144-0x00000000042F0000-0x0000000004321000-memory.dmp

            Filesize

            196KB

          • memory/4824-143-0x0000000004270000-0x00000000042A6000-memory.dmp

            Filesize

            216KB

          • memory/4824-142-0x0000000004230000-0x0000000004261000-memory.dmp

            Filesize

            196KB

          • memory/4824-147-0x00000000042F0000-0x0000000004321000-memory.dmp

            Filesize

            196KB