Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 11:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f.dll
Resource
win7-20220901-en
General
-
Target
33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f.dll
-
Size
96KB
-
MD5
0a4566c77cbd26c01b34d1d7e6637ff0
-
SHA1
77a3a44c23d1767c130cd39d722ef0a592dd6857
-
SHA256
33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f
-
SHA512
380635ef75177339b72bd1dee46925c1edd165ae6ab5f4889151638cf49ab0bc9084967044211b23d93ed83fbc86466951fe4e948f3f29e8f2353ccd970d0375
-
SSDEEP
3072:qD/1QkfFFFnHLidQXdoTfnUC6l/lJCCwRzlGDF7Gq7:qDSQXd8fnp6l/L7wRzm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5084 rundll32mgr.exe -
resource yara_rule behavioral2/memory/5084-137-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/5084-139-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/5084-140-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/5084-141-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3824 3204 WerFault.exe 76 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375797459" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4220865260" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997921" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997921" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4198207981" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2580F40F-6995-11ED-AECB-5EAE84113378} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4198207981" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997921" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5084 rundll32mgr.exe 5084 rundll32mgr.exe 5084 rundll32mgr.exe 5084 rundll32mgr.exe 5084 rundll32mgr.exe 5084 rundll32mgr.exe 5084 rundll32mgr.exe 5084 rundll32mgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4484 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5084 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4484 iexplore.exe 4484 iexplore.exe 4808 IEXPLORE.EXE 4808 IEXPLORE.EXE 4808 IEXPLORE.EXE 4808 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 5084 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1348 wrote to memory of 3204 1348 rundll32.exe 76 PID 1348 wrote to memory of 3204 1348 rundll32.exe 76 PID 1348 wrote to memory of 3204 1348 rundll32.exe 76 PID 3204 wrote to memory of 5084 3204 rundll32.exe 77 PID 3204 wrote to memory of 5084 3204 rundll32.exe 77 PID 3204 wrote to memory of 5084 3204 rundll32.exe 77 PID 5084 wrote to memory of 4484 5084 rundll32mgr.exe 80 PID 5084 wrote to memory of 4484 5084 rundll32mgr.exe 80 PID 4484 wrote to memory of 4808 4484 iexplore.exe 82 PID 4484 wrote to memory of 4808 4484 iexplore.exe 82 PID 4484 wrote to memory of 4808 4484 iexplore.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4484 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 6203⤵
- Program crash
PID:3824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3204 -ip 32041⤵PID:4224
Network
-
Remote address:8.8.8.8:53Requestapi.bing.comIN AResponseapi.bing.comIN CNAMEapi-bing-com.e-0001.e-msedge.netapi-bing-com.e-0001.e-msedge.netIN CNAMEafd.e-0001.e-dc-msedge.netafd.e-0001.e-dc-msedge.netIN CNAMEe-0001.e-dc-msedge.nete-0001.e-dc-msedge.netIN A13.107.13.80
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5fba9053e3a7f286a68a072f5d1b57b42
SHA119c4800e8de1e83ff7bf0b96a96563e8430ce9f3
SHA2565675295a26c3839803fd25fb667f2be09c2b6bf3412202a09c3dfc9a46eb4ca4
SHA512ee53bbd9531801df780279da49bd34863513db67fbacbd6b0abb844d02cb76f5e86ed39ad28585b27aa42d3659a8fc9f3d1459f92f81eca970e69bac7c403c64
-
Filesize
54KB
MD5fba9053e3a7f286a68a072f5d1b57b42
SHA119c4800e8de1e83ff7bf0b96a96563e8430ce9f3
SHA2565675295a26c3839803fd25fb667f2be09c2b6bf3412202a09c3dfc9a46eb4ca4
SHA512ee53bbd9531801df780279da49bd34863513db67fbacbd6b0abb844d02cb76f5e86ed39ad28585b27aa42d3659a8fc9f3d1459f92f81eca970e69bac7c403c64