Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    104s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 03:28

General

  • Target

    56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll

  • Size

    576KB

  • MD5

    573450c63953c2680db1f74879a1b670

  • SHA1

    111d4f63c0eadc4504bdabea4f689350f0ad1799

  • SHA256

    56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562

  • SHA512

    a6a87da03a6a79a22cf9d6ddcdfc9d44ac69ae9613a918b0c548b9c38878840d90952e15b7316963d389b6c109f175c642567ae0e6ef6fa50a0285fdda895420

  • SSDEEP

    12288:kZL7A5l0711g8onrOcWAqVvZf4tZbEQyL:kZL7AfYhonSZQtZwL

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1236
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1796
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1268
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 232
        3⤵
        • Program crash
        PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{153DB271-5064-11ED-9ECC-C253C434FFA8}.dat

    Filesize

    5KB

    MD5

    0c938df2b42db92ddad7e4104ef7a30e

    SHA1

    5691f71e4d0aea49a90789cbfa82c0770d2ab716

    SHA256

    814a2e811a83044ff5428c4f5613557d7dc0c824a5f79f7dc0fe8d6808527fbd

    SHA512

    05868767bb54a31a670bc91d22fdbfd9018b2456f2949077089d97815d2a5cdaeca3953c19b9fd77f8a6959c6d2d6a83b28e4d4d69c233e0b4f8196eac6e8571

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{154309A1-5064-11ED-9ECC-C253C434FFA8}.dat

    Filesize

    3KB

    MD5

    978c42a6fa0b8f5e4e857c920be9357c

    SHA1

    af17b2a0861320139a751fbb164ad912227383b6

    SHA256

    87eaad75e84928a464f0bbfe7678fa788bc9ebc768b056a4124a07a90c69f729

    SHA512

    b1ca67e3d180ab41b34a7b3199c8c1b4bed7409f1eb9f6b2ed96cafe58fe0cae32ca292222e15927b5fd2bf48db40685826420e1689344b00630b8539892f375

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZPC89FLV.txt

    Filesize

    598B

    MD5

    2bd23a26590a0486e54da65c94955488

    SHA1

    de0027e9574acfb7b63f249ed20bf4b59605831a

    SHA256

    163eaa807b85ad71c65d4ae53dfcce97db4040744b4e5f3c2586ec6689c29827

    SHA512

    f17fbf763b805fb54fc5d50188f8436fb54b56623c48e9939c0c5491cb80fa3778366294a869c221c998f1587b3ebd5b8166c2ad5e3a82ce468bd133d1656f46

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    105KB

    MD5

    27761550031391c56a3a59d3cb7229a5

    SHA1

    643e456a5fb02a820e79e33fc66e8496f15e5955

    SHA256

    b6b449ecd550692a3d8d5424e00885155e898d5cbbde98543a5b7b877073daab

    SHA512

    2aa9607f71e4cb99ab4ccabe33a5f192117b733306cd8d1f4f3054077572e522bc71e1eae679877b5554d0bc3c1281fd5bcf822a2da5da291e6630f65470d0d6

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    105KB

    MD5

    27761550031391c56a3a59d3cb7229a5

    SHA1

    643e456a5fb02a820e79e33fc66e8496f15e5955

    SHA256

    b6b449ecd550692a3d8d5424e00885155e898d5cbbde98543a5b7b877073daab

    SHA512

    2aa9607f71e4cb99ab4ccabe33a5f192117b733306cd8d1f4f3054077572e522bc71e1eae679877b5554d0bc3c1281fd5bcf822a2da5da291e6630f65470d0d6

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    105KB

    MD5

    27761550031391c56a3a59d3cb7229a5

    SHA1

    643e456a5fb02a820e79e33fc66e8496f15e5955

    SHA256

    b6b449ecd550692a3d8d5424e00885155e898d5cbbde98543a5b7b877073daab

    SHA512

    2aa9607f71e4cb99ab4ccabe33a5f192117b733306cd8d1f4f3054077572e522bc71e1eae679877b5554d0bc3c1281fd5bcf822a2da5da291e6630f65470d0d6

  • memory/1252-63-0x0000000010000000-0x0000000010091000-memory.dmp

    Filesize

    580KB

  • memory/1252-64-0x0000000000260000-0x00000000002B6000-memory.dmp

    Filesize

    344KB

  • memory/1252-55-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/1328-65-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1328-66-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB