Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll
Resource
win10v2004-20220812-en
General
-
Target
56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll
-
Size
576KB
-
MD5
573450c63953c2680db1f74879a1b670
-
SHA1
111d4f63c0eadc4504bdabea4f689350f0ad1799
-
SHA256
56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562
-
SHA512
a6a87da03a6a79a22cf9d6ddcdfc9d44ac69ae9613a918b0c548b9c38878840d90952e15b7316963d389b6c109f175c642567ae0e6ef6fa50a0285fdda895420
-
SSDEEP
12288:kZL7A5l0711g8onrOcWAqVvZf4tZbEQyL:kZL7AfYhonSZQtZwL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1148 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x0009000000022e66-134.dat upx behavioral2/files/0x0009000000022e66-135.dat upx behavioral2/memory/1148-137-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1664 1148 WerFault.exe 82 1224 4696 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4696 4388 rundll32.exe 81 PID 4388 wrote to memory of 4696 4388 rundll32.exe 81 PID 4388 wrote to memory of 4696 4388 rundll32.exe 81 PID 4696 wrote to memory of 1148 4696 rundll32.exe 82 PID 4696 wrote to memory of 1148 4696 rundll32.exe 82 PID 4696 wrote to memory of 1148 4696 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56edc8144b50f7189911d473270aafb617accc52d3b090360e1cbc208f44e562.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 2284⤵
- Program crash
PID:1664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 6203⤵
- Program crash
PID:1224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4696 -ip 46961⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1148 -ip 11481⤵PID:3184
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD527761550031391c56a3a59d3cb7229a5
SHA1643e456a5fb02a820e79e33fc66e8496f15e5955
SHA256b6b449ecd550692a3d8d5424e00885155e898d5cbbde98543a5b7b877073daab
SHA5122aa9607f71e4cb99ab4ccabe33a5f192117b733306cd8d1f4f3054077572e522bc71e1eae679877b5554d0bc3c1281fd5bcf822a2da5da291e6630f65470d0d6
-
Filesize
105KB
MD527761550031391c56a3a59d3cb7229a5
SHA1643e456a5fb02a820e79e33fc66e8496f15e5955
SHA256b6b449ecd550692a3d8d5424e00885155e898d5cbbde98543a5b7b877073daab
SHA5122aa9607f71e4cb99ab4ccabe33a5f192117b733306cd8d1f4f3054077572e522bc71e1eae679877b5554d0bc3c1281fd5bcf822a2da5da291e6630f65470d0d6