Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 17:21
Behavioral task
behavioral1
Sample
a58baed50fa0f3d2337f8ff61e3493a0523fa2749504c6ae20e3b94f28e28836.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a58baed50fa0f3d2337f8ff61e3493a0523fa2749504c6ae20e3b94f28e28836.dll
Resource
win10v2004-20220901-en
General
-
Target
a58baed50fa0f3d2337f8ff61e3493a0523fa2749504c6ae20e3b94f28e28836.dll
-
Size
1.2MB
-
MD5
4300f7c96b86957e28f2bfe82107efa0
-
SHA1
cd47a74f1fa77878fc7abd9cb88cd1a750036d78
-
SHA256
a58baed50fa0f3d2337f8ff61e3493a0523fa2749504c6ae20e3b94f28e28836
-
SHA512
5b75048eb05826ada2fcc3a7ef0a2b83af647eb52c7694fe60c0ded3fd1632fb31721e757ec8853f9bcf25bbba1401872669d9b4295f2cfd7512d408a06568a3
-
SSDEEP
24576:ftRPOCAer4OgctCGBUnUYQSGc15342SxBxeCKtRATNtiQBxg0ITl:ft1Ae0o6b3iEOiQLhITl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5036 .exe -
resource yara_rule behavioral2/memory/2864-145-0x0000000000400000-0x000000000057C000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1980 5036 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2864 4540 rundll32.exe 83 PID 4540 wrote to memory of 2864 4540 rundll32.exe 83 PID 4540 wrote to memory of 2864 4540 rundll32.exe 83 PID 2864 wrote to memory of 5036 2864 rundll32.exe 85 PID 2864 wrote to memory of 5036 2864 rundll32.exe 85 PID 2864 wrote to memory of 5036 2864 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a58baed50fa0f3d2337f8ff61e3493a0523fa2749504c6ae20e3b94f28e28836.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a58baed50fa0f3d2337f8ff61e3493a0523fa2749504c6ae20e3b94f28e28836.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\.exeC:\Users\Admin\AppData\Local\Temp\.exe3⤵
- Executes dropped EXE
PID:5036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 4844⤵
- Program crash
PID:1980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5036 -ip 50361⤵PID:4360
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD5e12a7f4eed02579ee03672d281df57f0
SHA12df26de94eae5f49f72e83eeddf9ce20c72e4924
SHA256e0aa189855154cbc3fb64fcbdf5c4f9fd394bd229da7e63ed25e1aad10da69c5
SHA512ec41b4268ab919d2fc7274051516d6a4593029cb55d579bdf3a7aa78e4757c7c3dab2fb1ec64e58476afb9b453d9bc90aa5d100d8f9a8d1a79765c5758761f80
-
Filesize
855KB
MD5e12a7f4eed02579ee03672d281df57f0
SHA12df26de94eae5f49f72e83eeddf9ce20c72e4924
SHA256e0aa189855154cbc3fb64fcbdf5c4f9fd394bd229da7e63ed25e1aad10da69c5
SHA512ec41b4268ab919d2fc7274051516d6a4593029cb55d579bdf3a7aa78e4757c7c3dab2fb1ec64e58476afb9b453d9bc90aa5d100d8f9a8d1a79765c5758761f80