Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
b589b79d19de9389c621142fc05f9bd180a1c84f7d2ee701d6f8ace9e0ccab25.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b589b79d19de9389c621142fc05f9bd180a1c84f7d2ee701d6f8ace9e0ccab25.dll
Resource
win10v2004-20220812-en
General
-
Target
b589b79d19de9389c621142fc05f9bd180a1c84f7d2ee701d6f8ace9e0ccab25.dll
-
Size
1.6MB
-
MD5
80a52efd0c41ba37770c711fb85ca4f0
-
SHA1
508a62cdf6835cc78fb90d2a0723bf55e3556b90
-
SHA256
b589b79d19de9389c621142fc05f9bd180a1c84f7d2ee701d6f8ace9e0ccab25
-
SHA512
2e59884bf8dfffcefc3ac67d56b399b2a00bd5cefd7cec4be1ad164115b6d41b5547419ff85aa1e4dc82a593a3b2ee7561ad358abc3e30b39c3a1580a21fc025
-
SSDEEP
3072:G3huG90E7NOkdvaURX0iyUhfImen+ELTD2qnFkscO8Nw0r8usH3:euG9nN91R0iHFI1LTDpeK8Os
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SENS\Parameters\ServiceDll = "C:\\PROGRA~3\\asolonaimvir.dat" rundll32.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\PROGRA~3\rivmianolosa.dat rundll32.exe File created C:\PROGRA~3\asolonaimvir.dat rundll32.exe File opened for modification C:\PROGRA~3\asolonaimvir.dat rundll32.exe File created C:\PROGRA~3\rivmianolosa.dat rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{EFC5F35C-31A6-4AD2-AF6C-9F45C2635C89}.crmlog dllhost.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{EFC5F35C-31A6-4AD2-AF6C-9F45C2635C89}.crmlog dllhost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 928 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 1072 Process not Found 1072 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 928 rundll32.exe Token: SeDebugPrivilege 928 rundll32.exe Token: SeDebugPrivilege 928 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 928 rundll32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 992 wrote to memory of 928 992 rundll32.exe 27 PID 992 wrote to memory of 928 992 rundll32.exe 27 PID 992 wrote to memory of 928 992 rundll32.exe 27 PID 992 wrote to memory of 928 992 rundll32.exe 27 PID 992 wrote to memory of 928 992 rundll32.exe 27 PID 992 wrote to memory of 928 992 rundll32.exe 27 PID 992 wrote to memory of 928 992 rundll32.exe 27 PID 928 wrote to memory of 596 928 rundll32.exe 26 PID 928 wrote to memory of 1392 928 rundll32.exe 28 PID 928 wrote to memory of 1392 928 rundll32.exe 28 PID 928 wrote to memory of 1392 928 rundll32.exe 28 PID 928 wrote to memory of 1392 928 rundll32.exe 28 PID 1392 wrote to memory of 804 1392 cmd.exe 30 PID 1392 wrote to memory of 804 1392 cmd.exe 30 PID 1392 wrote to memory of 804 1392 cmd.exe 30 PID 1392 wrote to memory of 804 1392 cmd.exe 30 PID 804 wrote to memory of 536 804 net.exe 31 PID 804 wrote to memory of 536 804 net.exe 31 PID 804 wrote to memory of 536 804 net.exe 31 PID 804 wrote to memory of 536 804 net.exe 31 PID 928 wrote to memory of 1844 928 rundll32.exe 33 PID 928 wrote to memory of 1844 928 rundll32.exe 33 PID 928 wrote to memory of 1844 928 rundll32.exe 33 PID 928 wrote to memory of 1844 928 rundll32.exe 33 PID 1844 wrote to memory of 1696 1844 cmd.exe 35 PID 1844 wrote to memory of 1696 1844 cmd.exe 35 PID 1844 wrote to memory of 1696 1844 cmd.exe 35 PID 1844 wrote to memory of 1696 1844 cmd.exe 35 PID 1696 wrote to memory of 1668 1696 net.exe 36 PID 1696 wrote to memory of 1668 1696 net.exe 36 PID 1696 wrote to memory of 1668 1696 net.exe 36 PID 1696 wrote to memory of 1668 1696 net.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b589b79d19de9389c621142fc05f9bd180a1c84f7d2ee701d6f8ace9e0ccab25.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b589b79d19de9389c621142fc05f9bd180a1c84f7d2ee701d6f8ace9e0ccab25.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net start COMSysApp3⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\net.exenet start COMSysApp4⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start COMSysApp5⤵PID:536
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net start SENS3⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\net.exenet start SENS4⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SENS5⤵PID:1668
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:596
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Drops file in Windows directory
PID:1028