Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/11/2022, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
DKyVKmgVSvviRl.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
DKyVKmgVSvviRl.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
aMLjTIhBvevLGx.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
aMLjTIhBvevLGx.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
details.lnk
Resource
win7-20220901-en
General
-
Target
DKyVKmgVSvviRl.bat
-
Size
1KB
-
MD5
a3278817a228bfe014efa23c1f5ea606
-
SHA1
577b3550e9fae158aa5020c0e2eec4159657b261
-
SHA256
b00a6c38740aece0bf52e3ae04523ed03009908353709de8463580bb628c2c1e
-
SHA512
c74a1feac03c9a0cf7d9e53547cde5df06bafdde73d1bf1f289c42c9deb23c269f6a732a3de095e4f579b320adc7cd18568565c437f4d1b8db0ec3d2aedd269e
Malware Config
Extracted
bumblebee
0411
192.119.120.146:443
54.37.131.10:443
146.70.139.252:443
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 1 1416 rundll32.exe 3 1416 rundll32.exe 4 1416 rundll32.exe 5 1416 rundll32.exe 6 1416 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1416 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1416 1468 cmd.exe 28 PID 1468 wrote to memory of 1416 1468 cmd.exe 28 PID 1468 wrote to memory of 1416 1468 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\DKyVKmgVSvviRl.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\rundll32.exerundll32 aMLjTIhBvevLGx.dll,SendData2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1416
-