Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 12:24

General

  • Target

    1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll

  • Size

    14.6MB

  • MD5

    6eaf6f6a28b0cae784a04a59c36a102b

  • SHA1

    63ccbdf14e6621c98ada7e4228c7b100c4850e16

  • SHA256

    1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026

  • SHA512

    e5490f763ffab322f1e98ad342474cb1a168d3d740d628ab1982a5516b0456af406d68c307255566249e2480d84bb3f0097d31fc4596b8b2f443dcfd92513d0e

  • SSDEEP

    196608:4RPoqFr6cC5APwjHD+nqNFneTLIOMNjKdeNeC6JVc5g4C/GdAsMD0xwr:yoer6nnjHFneTLIOMwUNP6b

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1640f42b2992a7a41f2804f45ffbad2ee36fac538865a0b875ee12a0ca53f026.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1756
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1528
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 268
        3⤵
        • Program crash
        PID:1924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E3EFAAE1-499F-11ED-A645-626C2AE6DC56}.dat

    Filesize

    4KB

    MD5

    74bb7fc27bec882fce2b6f1f74025db5

    SHA1

    1b0c2dfd89f76db5aab78d77e996d46b0929815d

    SHA256

    01338ee3fb83ebc2c3cfa5a12c3ca66109480d54de09106f04a11717fc79e418

    SHA512

    1743104f0be06e1881057c0fb2db6b2fe66ba0ab1c290d2d9ad2dd6dbe51ad412e824caa371978b1913a34d9b80bdc965cdc83ff32e50ec5efb4cfe30825b13d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E3F20C41-499F-11ED-A645-626C2AE6DC56}.dat

    Filesize

    5KB

    MD5

    90420b7e0a35d6aa282f4ab71b02b23c

    SHA1

    2f6e7e06c9cdaf3ccdbac47cea935ef09cabdfab

    SHA256

    bba81de2652d36666378bf463e6ca7e9cad9bab6664d18bef741c4a2a6913eed

    SHA512

    06c7b10efc44c25275d48f9793a3d9b3d1f45029e4cdf1c4c258a16edd4cc295ca993aff76a757a39809bf86112271547d6038a25f60dd6be1cc61416cf39dc9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\44BDKL86.txt

    Filesize

    608B

    MD5

    ac943a58bd6ae9f4a47046b1a79c9e6c

    SHA1

    e710bc421a66c01b80cdb2ae19c07ffd1c94b5a2

    SHA256

    5f977c4441a3e8aa6e9397f3f4fe88a2b82078e270c121d5d6c505b90583f9d8

    SHA512

    85d96725ef13e69797ba27d072a229dcce633899b759f5e98dd2abb5cf47ca8275321ae2b99d0082fd8785baef6361e06c6c30c7a270001f0f3264fb27fcfe9c

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    206KB

    MD5

    71a0cc521d70fca7e86fba2b799e54e3

    SHA1

    689ab159541c45d738be7329918808c1c1e58050

    SHA256

    e13ad23118da481600ad8e4ffd4d5e060eeb23da05eeffcd299c2cdcfa3dc023

    SHA512

    6da749226ddc085a8d04a8bdd3c30a0476257673c1489281301dc3204cc32fae6740e5b4368f8bc53d882ae7415034bf9dc98247504425e7c815387578796952

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    206KB

    MD5

    71a0cc521d70fca7e86fba2b799e54e3

    SHA1

    689ab159541c45d738be7329918808c1c1e58050

    SHA256

    e13ad23118da481600ad8e4ffd4d5e060eeb23da05eeffcd299c2cdcfa3dc023

    SHA512

    6da749226ddc085a8d04a8bdd3c30a0476257673c1489281301dc3204cc32fae6740e5b4368f8bc53d882ae7415034bf9dc98247504425e7c815387578796952

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    206KB

    MD5

    71a0cc521d70fca7e86fba2b799e54e3

    SHA1

    689ab159541c45d738be7329918808c1c1e58050

    SHA256

    e13ad23118da481600ad8e4ffd4d5e060eeb23da05eeffcd299c2cdcfa3dc023

    SHA512

    6da749226ddc085a8d04a8bdd3c30a0476257673c1489281301dc3204cc32fae6740e5b4368f8bc53d882ae7415034bf9dc98247504425e7c815387578796952

  • memory/1988-62-0x0000000000470000-0x00000000004E0000-memory.dmp

    Filesize

    448KB

  • memory/1988-63-0x0000000000470000-0x00000000004E0000-memory.dmp

    Filesize

    448KB

  • memory/1988-61-0x0000000010000000-0x0000000010EA3000-memory.dmp

    Filesize

    14.6MB

  • memory/1988-68-0x0000000000470000-0x00000000004E0000-memory.dmp

    Filesize

    448KB

  • memory/1988-69-0x0000000000470000-0x00000000004E0000-memory.dmp

    Filesize

    448KB

  • memory/1988-55-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/2000-64-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2000-67-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB