Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
2b959bf862d9fbe941e979007f317ac1dba4f8af962aadfc2f1b451792784337.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b959bf862d9fbe941e979007f317ac1dba4f8af962aadfc2f1b451792784337.dll
Resource
win10v2004-20220812-en
General
-
Target
2b959bf862d9fbe941e979007f317ac1dba4f8af962aadfc2f1b451792784337.dll
-
Size
308KB
-
MD5
00730544f0f9202fa7d10d9c4f21a360
-
SHA1
2178442bc2ac04b4256515085ee1aef420ddfac4
-
SHA256
2b959bf862d9fbe941e979007f317ac1dba4f8af962aadfc2f1b451792784337
-
SHA512
9f07237dc41f91cbf01de47a7c2869bdf3c49fe6267645c9a43f87d21cd69387dfad574a1cfdf3a3f94fcbe8f6730347a6f540fdc727e24a3707da160f34dad8
-
SSDEEP
6144:yriT2hMLaWJLmxR62jWkhnMvcUKL39AmcxOWlsuoi2vX:3LaYWRKklocUY32xbyzX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5064 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x0008000000022e5b-134.dat upx behavioral2/files/0x0008000000022e5b-135.dat upx behavioral2/memory/5064-137-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral2/memory/5064-138-0x0000000000400000-0x0000000000480000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4768 5064 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4740 wrote to memory of 1124 4740 rundll32.exe 82 PID 4740 wrote to memory of 1124 4740 rundll32.exe 82 PID 4740 wrote to memory of 1124 4740 rundll32.exe 82 PID 1124 wrote to memory of 5064 1124 rundll32.exe 83 PID 1124 wrote to memory of 5064 1124 rundll32.exe 83 PID 1124 wrote to memory of 5064 1124 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b959bf862d9fbe941e979007f317ac1dba4f8af962aadfc2f1b451792784337.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2b959bf862d9fbe941e979007f317ac1dba4f8af962aadfc2f1b451792784337.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 5204⤵
- Program crash
PID:4768
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5064 -ip 50641⤵PID:624
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD59f1d413bad8c2ae51dae797bff0b471f
SHA11f284c735287387461666f30926afc3746609877
SHA256ac914d391e854a0a7896944819fedb3eb2d1be4f34e3478abce2a4129a1f8845
SHA512eaaa8499ce71d0f27912c2a194e62e9a9660602f9488503688d21fa9efc45a448a8e011c8bbb1feeca0b2fc25789362a2cc6069062e78e688abc0aa26e8b70c5
-
Filesize
184KB
MD59f1d413bad8c2ae51dae797bff0b471f
SHA11f284c735287387461666f30926afc3746609877
SHA256ac914d391e854a0a7896944819fedb3eb2d1be4f34e3478abce2a4129a1f8845
SHA512eaaa8499ce71d0f27912c2a194e62e9a9660602f9488503688d21fa9efc45a448a8e011c8bbb1feeca0b2fc25789362a2cc6069062e78e688abc0aa26e8b70c5