Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
9eba80753a0f851470c6b67cc7941b07642acc1eabe43643ad1233bf4697a52b.dll
Resource
win7-20220812-en
General
-
Target
9eba80753a0f851470c6b67cc7941b07642acc1eabe43643ad1233bf4697a52b.dll
-
Size
232KB
-
MD5
49f6f48b6439f2ba94b4523a3421b2d0
-
SHA1
30d68a62a65a73a8690f473e2abadd6646a77652
-
SHA256
9eba80753a0f851470c6b67cc7941b07642acc1eabe43643ad1233bf4697a52b
-
SHA512
a3231f99a4507d83dc79b575e1de51d76d84bc82a006e6c336fe1b98d41f56bc08c9f20bbfdeb3088ed6dd5114005741de57e388c732a8eb82ffa27396d97941
-
SSDEEP
3072:SJ/bDvolYJ975jjHnNNHLwj5Hj59BjUY0quvirFHWMiA/HQ0P0CKKgiT4fUADtN2:SJ/8W2uvihHFHlTT4h55ZBXK
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\rundll32.exe = "C:\\Windows\\SysWOW64\\rundll32.exe:*:enabled:@shell32.dll,-1" rundll32.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 19 2668 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 4748 rundll32Srv.exe -
resource yara_rule behavioral2/files/0x0001000000022de9-135.dat upx behavioral2/memory/4748-136-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0001000000022de9-137.dat upx behavioral2/memory/4748-140-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxD640.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4880 4748 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4748 rundll32Srv.exe 4748 rundll32Srv.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe 4748 rundll32Srv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4748 rundll32Srv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 2668 3964 rundll32.exe 83 PID 3964 wrote to memory of 2668 3964 rundll32.exe 83 PID 3964 wrote to memory of 2668 3964 rundll32.exe 83 PID 2668 wrote to memory of 4748 2668 rundll32.exe 85 PID 2668 wrote to memory of 4748 2668 rundll32.exe 85 PID 2668 wrote to memory of 4748 2668 rundll32.exe 85 PID 4748 wrote to memory of 616 4748 rundll32Srv.exe 5 PID 4748 wrote to memory of 616 4748 rundll32Srv.exe 5 PID 4748 wrote to memory of 616 4748 rundll32Srv.exe 5 PID 4748 wrote to memory of 616 4748 rundll32Srv.exe 5 PID 4748 wrote to memory of 616 4748 rundll32Srv.exe 5 PID 4748 wrote to memory of 616 4748 rundll32Srv.exe 5 PID 4748 wrote to memory of 668 4748 rundll32Srv.exe 3 PID 4748 wrote to memory of 668 4748 rundll32Srv.exe 3 PID 4748 wrote to memory of 668 4748 rundll32Srv.exe 3 PID 4748 wrote to memory of 668 4748 rundll32Srv.exe 3 PID 4748 wrote to memory of 668 4748 rundll32Srv.exe 3 PID 4748 wrote to memory of 668 4748 rundll32Srv.exe 3 PID 4748 wrote to memory of 784 4748 rundll32Srv.exe 9 PID 4748 wrote to memory of 784 4748 rundll32Srv.exe 9 PID 4748 wrote to memory of 784 4748 rundll32Srv.exe 9 PID 4748 wrote to memory of 784 4748 rundll32Srv.exe 9 PID 4748 wrote to memory of 784 4748 rundll32Srv.exe 9 PID 4748 wrote to memory of 784 4748 rundll32Srv.exe 9 PID 4748 wrote to memory of 792 4748 rundll32Srv.exe 8 PID 4748 wrote to memory of 792 4748 rundll32Srv.exe 8 PID 4748 wrote to memory of 792 4748 rundll32Srv.exe 8 PID 4748 wrote to memory of 792 4748 rundll32Srv.exe 8 PID 4748 wrote to memory of 792 4748 rundll32Srv.exe 8 PID 4748 wrote to memory of 792 4748 rundll32Srv.exe 8 PID 4748 wrote to memory of 800 4748 rundll32Srv.exe 13 PID 4748 wrote to memory of 800 4748 rundll32Srv.exe 13 PID 4748 wrote to memory of 800 4748 rundll32Srv.exe 13 PID 4748 wrote to memory of 800 4748 rundll32Srv.exe 13 PID 4748 wrote to memory of 800 4748 rundll32Srv.exe 13 PID 4748 wrote to memory of 800 4748 rundll32Srv.exe 13 PID 4748 wrote to memory of 908 4748 rundll32Srv.exe 12 PID 4748 wrote to memory of 908 4748 rundll32Srv.exe 12 PID 4748 wrote to memory of 908 4748 rundll32Srv.exe 12 PID 4748 wrote to memory of 908 4748 rundll32Srv.exe 12 PID 4748 wrote to memory of 908 4748 rundll32Srv.exe 12 PID 4748 wrote to memory of 908 4748 rundll32Srv.exe 12 PID 4748 wrote to memory of 956 4748 rundll32Srv.exe 11 PID 4748 wrote to memory of 956 4748 rundll32Srv.exe 11 PID 4748 wrote to memory of 956 4748 rundll32Srv.exe 11 PID 4748 wrote to memory of 956 4748 rundll32Srv.exe 11 PID 4748 wrote to memory of 956 4748 rundll32Srv.exe 11 PID 4748 wrote to memory of 956 4748 rundll32Srv.exe 11 PID 4748 wrote to memory of 372 4748 rundll32Srv.exe 10 PID 4748 wrote to memory of 372 4748 rundll32Srv.exe 10 PID 4748 wrote to memory of 372 4748 rundll32Srv.exe 10 PID 4748 wrote to memory of 372 4748 rundll32Srv.exe 10 PID 4748 wrote to memory of 372 4748 rundll32Srv.exe 10 PID 4748 wrote to memory of 372 4748 rundll32Srv.exe 10 PID 4748 wrote to memory of 436 4748 rundll32Srv.exe 14 PID 4748 wrote to memory of 436 4748 rundll32Srv.exe 14 PID 4748 wrote to memory of 436 4748 rundll32Srv.exe 14 PID 4748 wrote to memory of 436 4748 rundll32Srv.exe 14 PID 4748 wrote to memory of 436 4748 rundll32Srv.exe 14 PID 4748 wrote to memory of 436 4748 rundll32Srv.exe 14 PID 4748 wrote to memory of 752 4748 rundll32Srv.exe 16 PID 4748 wrote to memory of 752 4748 rundll32Srv.exe 16 PID 4748 wrote to memory of 752 4748 rundll32Srv.exe 16 PID 4748 wrote to memory of 752 4748 rundll32Srv.exe 16
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:372
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:784
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3440
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1768
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:3740
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4836
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:2056
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4692
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3820
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3520
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3380
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3316
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3216
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3636
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1000
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1104
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2400
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1052
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1248
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2292
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2672
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2484
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:2380
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9eba80753a0f851470c6b67cc7941b07642acc1eabe43643ad1233bf4697a52b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9eba80753a0f851470c6b67cc7941b07642acc1eabe43643ad1233bf4697a52b.dll,#12⤵
- Modifies firewall policy service
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 3844⤵
- Program crash
PID:4880
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:5032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1328
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2320
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2128
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2068
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:1428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1900
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1652
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1476
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4748 -ip 47481⤵PID:4832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5675e06a8ef823be7b39d4fd7c5f4560d
SHA108cb14c576b35d0e79fcaf9674ebb4da598b8868
SHA25667135fa98f6a5f7d2d888e959060cb81ef0ca22092e7ac36cf47bf3bb1ac935d
SHA5121e720f76778092aaa949179daee88cfa64ce8b28cf5721f5609ed4f0d4e1e8d854261a47f0d0380c0d261ba74577295db5ee4c2c4c35ac32c0de2c191d96484b
-
Filesize
170KB
MD5675e06a8ef823be7b39d4fd7c5f4560d
SHA108cb14c576b35d0e79fcaf9674ebb4da598b8868
SHA25667135fa98f6a5f7d2d888e959060cb81ef0ca22092e7ac36cf47bf3bb1ac935d
SHA5121e720f76778092aaa949179daee88cfa64ce8b28cf5721f5609ed4f0d4e1e8d854261a47f0d0380c0d261ba74577295db5ee4c2c4c35ac32c0de2c191d96484b