Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    32s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 23:47 UTC

General

  • Target

    05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7.exe

  • Size

    1.4MB

  • MD5

    ab54010702c82bba492dad75a9adbcd3

  • SHA1

    63d17ed4296fb5ee1e7f49e7b100a53dc8ac58cc

  • SHA256

    05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7

  • SHA512

    08410ba5bed0b9eae4c046b0d36fb0cdc659ca29fa674cce1b56775eff5d2237f30a393de6d4cbc0e58321e67571976031e322dbed7067f202e98bdb22ab18fa

  • SSDEEP

    24576:8WrJpitnKSwFkgUB2eziTchJ/UB2unrt5YqUpdIEQfgRdEE:7rJpBF02MiQhdUdrXzDgRdEE

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7.exe
    "C:\Users\Admin\AppData\Local\Temp\05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Local\rundll.exe
      "C:\Users\Admin\AppData\Local\rundll.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Users\Admin\AppData\Local\rundll.exe
        "C:\Users\Admin\AppData\Local\rundll.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:1236

Network

    No results found
  • 174.138.160.19:8080
    rundll.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\rundll.exe

    Filesize

    1.4MB

    MD5

    ab54010702c82bba492dad75a9adbcd3

    SHA1

    63d17ed4296fb5ee1e7f49e7b100a53dc8ac58cc

    SHA256

    05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7

    SHA512

    08410ba5bed0b9eae4c046b0d36fb0cdc659ca29fa674cce1b56775eff5d2237f30a393de6d4cbc0e58321e67571976031e322dbed7067f202e98bdb22ab18fa

  • C:\Users\Admin\AppData\Local\rundll.exe

    Filesize

    1.4MB

    MD5

    ab54010702c82bba492dad75a9adbcd3

    SHA1

    63d17ed4296fb5ee1e7f49e7b100a53dc8ac58cc

    SHA256

    05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7

    SHA512

    08410ba5bed0b9eae4c046b0d36fb0cdc659ca29fa674cce1b56775eff5d2237f30a393de6d4cbc0e58321e67571976031e322dbed7067f202e98bdb22ab18fa

  • C:\Users\Admin\AppData\Local\rundll.exe

    Filesize

    1.4MB

    MD5

    ab54010702c82bba492dad75a9adbcd3

    SHA1

    63d17ed4296fb5ee1e7f49e7b100a53dc8ac58cc

    SHA256

    05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7

    SHA512

    08410ba5bed0b9eae4c046b0d36fb0cdc659ca29fa674cce1b56775eff5d2237f30a393de6d4cbc0e58321e67571976031e322dbed7067f202e98bdb22ab18fa

  • \Users\Admin\AppData\Local\rundll.exe

    Filesize

    1.4MB

    MD5

    ab54010702c82bba492dad75a9adbcd3

    SHA1

    63d17ed4296fb5ee1e7f49e7b100a53dc8ac58cc

    SHA256

    05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7

    SHA512

    08410ba5bed0b9eae4c046b0d36fb0cdc659ca29fa674cce1b56775eff5d2237f30a393de6d4cbc0e58321e67571976031e322dbed7067f202e98bdb22ab18fa

  • \Users\Admin\AppData\Local\rundll.exe

    Filesize

    1.4MB

    MD5

    ab54010702c82bba492dad75a9adbcd3

    SHA1

    63d17ed4296fb5ee1e7f49e7b100a53dc8ac58cc

    SHA256

    05df488f060360608ef2cf5a1f2130dcc20ff9dfad3d03588534566473243db7

    SHA512

    08410ba5bed0b9eae4c046b0d36fb0cdc659ca29fa674cce1b56775eff5d2237f30a393de6d4cbc0e58321e67571976031e322dbed7067f202e98bdb22ab18fa

  • memory/1236-89-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1236-88-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1236-86-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1236-87-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1236-83-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1236-81-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1940-65-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-79-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-78-0x0000000075C61000-0x0000000075C63000-memory.dmp

    Filesize

    8KB

  • memory/1940-77-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-73-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-70-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-67-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-62-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-59-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-57-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/1940-56-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.