Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
b5e61224db265addd676275e862f41d3732252109c28fc77af911ffd6c6f0a02.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5e61224db265addd676275e862f41d3732252109c28fc77af911ffd6c6f0a02.dll
Resource
win10v2004-20220812-en
General
-
Target
b5e61224db265addd676275e862f41d3732252109c28fc77af911ffd6c6f0a02.dll
-
Size
295KB
-
MD5
2ae32607c6b09020477b571ef1a9ac60
-
SHA1
e25eeb39feff465d3f6b258a013bbaf0903c35f4
-
SHA256
b5e61224db265addd676275e862f41d3732252109c28fc77af911ffd6c6f0a02
-
SHA512
484ca2df35ac2811eb678ffbfd1f01c89c1473e3a3fc21f80b4baae3ef16b4004b203183108abe7d550056418bad5ed06d365aea9b297bf163ba379f930c27e0
-
SSDEEP
3072:E7qxa8NoYr6w5S8o6epM++v/cfLWvPT8IvQIhFupyufsm53fioxrz0PWuHGBcwKd:E+vNoYYcvhvPpv7hgpy+pVfioxc+la
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3688 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x000a000000022e15-134.dat upx behavioral2/files/0x000a000000022e15-135.dat upx behavioral2/memory/3688-137-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral2/memory/3688-138-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4500 3688 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3452 4764 rundll32.exe 81 PID 4764 wrote to memory of 3452 4764 rundll32.exe 81 PID 4764 wrote to memory of 3452 4764 rundll32.exe 81 PID 3452 wrote to memory of 3688 3452 rundll32.exe 82 PID 3452 wrote to memory of 3688 3452 rundll32.exe 82 PID 3452 wrote to memory of 3688 3452 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5e61224db265addd676275e862f41d3732252109c28fc77af911ffd6c6f0a02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5e61224db265addd676275e862f41d3732252109c28fc77af911ffd6c6f0a02.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:3688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 2724⤵
- Program crash
PID:4500
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3688 -ip 36881⤵PID:4852
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5281b8e24fc062f50e31155b12df9678d
SHA19375588dd0442f8ef49282d46b1d72cfe080f30e
SHA2566b89da851bd071f909df7ba1c5378e162ae0e517940afeff07817990101e0e29
SHA512dc90e87c9d92c4620fb3f1222f09dd59e51d24b0c867f508c26305703ca83dc5357a10823f77ac1d026fe64b59729eee260c64a00398235b3a15e540a8460740
-
Filesize
201KB
MD5281b8e24fc062f50e31155b12df9678d
SHA19375588dd0442f8ef49282d46b1d72cfe080f30e
SHA2566b89da851bd071f909df7ba1c5378e162ae0e517940afeff07817990101e0e29
SHA512dc90e87c9d92c4620fb3f1222f09dd59e51d24b0c867f508c26305703ca83dc5357a10823f77ac1d026fe64b59729eee260c64a00398235b3a15e540a8460740