Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
0a7181f637d631cc52f69213e2979970b805bb6fa2d8e741ff47447ae9ebbf63.dll
Resource
win7-20220812-en
General
-
Target
0a7181f637d631cc52f69213e2979970b805bb6fa2d8e741ff47447ae9ebbf63.dll
-
Size
496KB
-
MD5
a2dfb9cea471297c7d8dea21beebfec0
-
SHA1
c1ef354b9135e97b9e6ff7913de3293b5e6cd994
-
SHA256
0a7181f637d631cc52f69213e2979970b805bb6fa2d8e741ff47447ae9ebbf63
-
SHA512
72974a755d623282a82664c7863893ebd0aa96f8041319ffd0e9bb6eae08ea4b44ef963b5a3fa0f1131b2f060ee7d05dcf3f1271e3dd201e906e881ae1f2d3a0
-
SSDEEP
12288:9ehnaNPpSVZmNxRCwnwm3W3OHIIf54bJsCfJshzF:9eh0PpS6NxNnwYeOHX6i0shz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 960 rundll32Srv.exe 1708 DesktopLayer.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/files/0x00140000000054ab-60.dat upx behavioral1/files/0x000a000000012306-62.dat upx behavioral1/files/0x000a000000012306-67.dat upx behavioral1/files/0x000a000000012306-65.dat upx behavioral1/memory/960-64-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1708-68-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1752 rundll32.exe 960 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px5581.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1340 1752 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1CFB0F0-585E-11ED-9351-5A21EB137514} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373904907" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1708 DesktopLayer.exe 1708 DesktopLayer.exe 1708 DesktopLayer.exe 1708 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1336 iexplore.exe 1336 iexplore.exe 1360 IEXPLORE.EXE 1360 IEXPLORE.EXE 1360 IEXPLORE.EXE 1360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 916 wrote to memory of 1752 916 rundll32.exe 28 PID 916 wrote to memory of 1752 916 rundll32.exe 28 PID 916 wrote to memory of 1752 916 rundll32.exe 28 PID 916 wrote to memory of 1752 916 rundll32.exe 28 PID 916 wrote to memory of 1752 916 rundll32.exe 28 PID 916 wrote to memory of 1752 916 rundll32.exe 28 PID 916 wrote to memory of 1752 916 rundll32.exe 28 PID 1752 wrote to memory of 960 1752 rundll32.exe 29 PID 1752 wrote to memory of 960 1752 rundll32.exe 29 PID 1752 wrote to memory of 960 1752 rundll32.exe 29 PID 1752 wrote to memory of 960 1752 rundll32.exe 29 PID 1752 wrote to memory of 1340 1752 rundll32.exe 30 PID 1752 wrote to memory of 1340 1752 rundll32.exe 30 PID 1752 wrote to memory of 1340 1752 rundll32.exe 30 PID 1752 wrote to memory of 1340 1752 rundll32.exe 30 PID 960 wrote to memory of 1708 960 rundll32Srv.exe 31 PID 960 wrote to memory of 1708 960 rundll32Srv.exe 31 PID 960 wrote to memory of 1708 960 rundll32Srv.exe 31 PID 960 wrote to memory of 1708 960 rundll32Srv.exe 31 PID 1708 wrote to memory of 1336 1708 DesktopLayer.exe 32 PID 1708 wrote to memory of 1336 1708 DesktopLayer.exe 32 PID 1708 wrote to memory of 1336 1708 DesktopLayer.exe 32 PID 1708 wrote to memory of 1336 1708 DesktopLayer.exe 32 PID 1336 wrote to memory of 1360 1336 iexplore.exe 34 PID 1336 wrote to memory of 1360 1336 iexplore.exe 34 PID 1336 wrote to memory of 1360 1336 iexplore.exe 34 PID 1336 wrote to memory of 1360 1336 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a7181f637d631cc52f69213e2979970b805bb6fa2d8e741ff47447ae9ebbf63.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a7181f637d631cc52f69213e2979970b805bb6fa2d8e741ff47447ae9ebbf63.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1336 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 2283⤵
- Program crash
PID:1340
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD59f179e646fb978a30b2aa0885e78c50f
SHA148314dd692a9494c44a90c6a4586775e9fee613e
SHA256f3838d7a76e03d0488392389e8b9ba12e020dd765d9396ec584e546ad989a9b9
SHA512eec10d1b634d9615902814616f89cfa7af31b575e84ec27db90a5f5376b186559ea2ec7faadd9ba95568ee90a7ef37d1363247828716fb4ae5fc25cfe88be10b
-
Filesize
111KB
MD59f179e646fb978a30b2aa0885e78c50f
SHA148314dd692a9494c44a90c6a4586775e9fee613e
SHA256f3838d7a76e03d0488392389e8b9ba12e020dd765d9396ec584e546ad989a9b9
SHA512eec10d1b634d9615902814616f89cfa7af31b575e84ec27db90a5f5376b186559ea2ec7faadd9ba95568ee90a7ef37d1363247828716fb4ae5fc25cfe88be10b
-
Filesize
608B
MD53157b87e1c5faa1c96f416f55c201264
SHA1a5b3b062e90a1450cc4618eb068f62ab6080f356
SHA256294409c9006189057ad28089408c5397d346e263d7fb048a64a48926466ce337
SHA512575d259235c5a20a7d099abc874dd2063b860a34fd9e59dd3cfff1ed4aac2287debb01791424ed76e0c7881cdf00433e75353d66f793b7716ca27d39adb03b0e
-
Filesize
111KB
MD59f179e646fb978a30b2aa0885e78c50f
SHA148314dd692a9494c44a90c6a4586775e9fee613e
SHA256f3838d7a76e03d0488392389e8b9ba12e020dd765d9396ec584e546ad989a9b9
SHA512eec10d1b634d9615902814616f89cfa7af31b575e84ec27db90a5f5376b186559ea2ec7faadd9ba95568ee90a7ef37d1363247828716fb4ae5fc25cfe88be10b
-
Filesize
111KB
MD59f179e646fb978a30b2aa0885e78c50f
SHA148314dd692a9494c44a90c6a4586775e9fee613e
SHA256f3838d7a76e03d0488392389e8b9ba12e020dd765d9396ec584e546ad989a9b9
SHA512eec10d1b634d9615902814616f89cfa7af31b575e84ec27db90a5f5376b186559ea2ec7faadd9ba95568ee90a7ef37d1363247828716fb4ae5fc25cfe88be10b
-
Filesize
111KB
MD59f179e646fb978a30b2aa0885e78c50f
SHA148314dd692a9494c44a90c6a4586775e9fee613e
SHA256f3838d7a76e03d0488392389e8b9ba12e020dd765d9396ec584e546ad989a9b9
SHA512eec10d1b634d9615902814616f89cfa7af31b575e84ec27db90a5f5376b186559ea2ec7faadd9ba95568ee90a7ef37d1363247828716fb4ae5fc25cfe88be10b
-
Filesize
111KB
MD59f179e646fb978a30b2aa0885e78c50f
SHA148314dd692a9494c44a90c6a4586775e9fee613e
SHA256f3838d7a76e03d0488392389e8b9ba12e020dd765d9396ec584e546ad989a9b9
SHA512eec10d1b634d9615902814616f89cfa7af31b575e84ec27db90a5f5376b186559ea2ec7faadd9ba95568ee90a7ef37d1363247828716fb4ae5fc25cfe88be10b