Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 13:43 UTC

General

  • Target

    b99b94f057a87daba97b296ee4c418e842910307054d9f9af026fe784af2077d.dll

  • Size

    236KB

  • MD5

    60254ff672dc9c0a744661f7709296d8

  • SHA1

    a4f603432f48fe9e6cf25bf9669c382ce0d4f402

  • SHA256

    b99b94f057a87daba97b296ee4c418e842910307054d9f9af026fe784af2077d

  • SHA512

    e77d13d9a8676d51a4b59a9723a447e7fecefab6f8ea787ece755dbb02db8eeddeee1c7e45db4ce210c47f7ff40de0d1ff46a7f696aa50a4b6684dc8a1368ef4

  • SSDEEP

    1536:1dKaTHN2ymZ0ofa5uQm4V7HG8ldINh+RhFtFftCgpcGO5lPf/XG8GmGwktbR:1Y4tIQG8XAmbFfaGc1fawk1R

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b99b94f057a87daba97b296ee4c418e842910307054d9f9af026fe784af2077d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b99b94f057a87daba97b296ee4c418e842910307054d9f9af026fe784af2077d.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1104

Network

    No results found
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    260 B
    5
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\lwvazaunl.dll

    Filesize

    478KB

    MD5

    e99416267b61f52fa5ab994019efd359

    SHA1

    86d31eae707db7fe51d2556394fcf0e8e9f6b0fd

    SHA256

    768c286674371564b5e6095edb56e0a4231f341be895da69cfccca5160029774

    SHA512

    0a1c7579a9c787c2c1bef35f0660e72e74b42824e14ebea63b87ed25ddaf107e3746567bb431cab41a2f6719fad2c22d96e0715a1fe085d75805d7d66f7f05ae

  • memory/1104-133-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1104-135-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.