Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
112029867a30d8d31f7aff8efcee543e63032f3725188a339123a2ab9ada0d70.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
112029867a30d8d31f7aff8efcee543e63032f3725188a339123a2ab9ada0d70.dll
Resource
win10v2004-20220812-en
General
-
Target
112029867a30d8d31f7aff8efcee543e63032f3725188a339123a2ab9ada0d70.dll
-
Size
24KB
-
MD5
613e16880890f334d006169d6924869f
-
SHA1
7252a4b7f5a2856ce3488dae7a6d482bafbd3849
-
SHA256
112029867a30d8d31f7aff8efcee543e63032f3725188a339123a2ab9ada0d70
-
SHA512
c1ec6cab7ebbb3cd52eee113f218f89d8eee0f4042f24a9c9dc2805ee8a67a17c6177df4606806bcdb4cac258b941e6019c9ce18e40e16318c8fec1e990bb3f8
-
SSDEEP
384:PmNwhCnHqdMZwJ1yOeA7qwzQ0XZuMaydpbJMkGGC8MC8:OycHqdMGw7ZZUKybbJMp/8N8
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tapi.nfo rundll32.exe File created C:\Windows\SysWOW64\tapi.nfo rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2552 3552 WerFault.exe 93 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3516 WINWORD.EXE 3516 WINWORD.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4988 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3516 WINWORD.EXE 3516 WINWORD.EXE 3516 WINWORD.EXE 3516 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1228 wrote to memory of 4988 1228 rundll32.exe 81 PID 1228 wrote to memory of 4988 1228 rundll32.exe 81 PID 1228 wrote to memory of 4988 1228 rundll32.exe 81 PID 4988 wrote to memory of 3552 4988 rundll32.exe 93 PID 4988 wrote to memory of 3552 4988 rundll32.exe 93 PID 4988 wrote to memory of 3552 4988 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\112029867a30d8d31f7aff8efcee543e63032f3725188a339123a2ab9ada0d70.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\112029867a30d8d31f7aff8efcee543e63032f3725188a339123a2ab9ada0d70.dll,#12⤵
- Drops file in System32 directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 1924⤵
- Program crash
PID:2552
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3552 -ip 35521⤵PID:616