Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    99s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 00:04

General

  • Target

    511a539eac0d06afcc72b0b55cc2f20c38d22cec03f3631c49ecb181e6866c27.exe

  • Size

    3.3MB

  • MD5

    cc8b4ddbe1bc0e61fc54859bbd8c9152

  • SHA1

    4e0ca1731872ca83b27a80947bb903a556e76a9f

  • SHA256

    511a539eac0d06afcc72b0b55cc2f20c38d22cec03f3631c49ecb181e6866c27

  • SHA512

    5ae90dc1e3d886afdcc936b3b171c4af89e44adf9a8cd24885ea9fcb64b31c38b8efac92f3638e0d4d63591277994aad94c451d1baa90fcbe74019daaf65ff0e

  • SSDEEP

    49152:DoRQsW6zg2yxIGSE9nV/elHQnCluG7AuE4IYupfSzTW2yu+4ufduZbyU:7sW6dHE5MlHOiBE4MpfSTW2y54u4Zb

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Modifies data under HKEY_USERS 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\511a539eac0d06afcc72b0b55cc2f20c38d22cec03f3631c49ecb181e6866c27.exe
    "C:\Users\Admin\AppData\Local\Temp\511a539eac0d06afcc72b0b55cc2f20c38d22cec03f3631c49ecb181e6866c27.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\goopad\goopad.dll",serv -install
      2⤵
      • Loads dropped DLL
      PID:1020
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\goopad\goopad.dll",serv
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\goopad\goopad.dll",serv
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Program Files (x86)\goopad\goopad.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • \Users\Admin\AppData\Local\Temp\tf24876d0e.dll

    Filesize

    1.9MB

    MD5

    c84f0e73e77093db963be62633064bcc

    SHA1

    36d768969071e65d21c43f5128fe782ed94453ea

    SHA256

    22d10228b923a5ad55ea9099d0fd809cf9b1adc5a1c8db8b6c43ba0885a001d6

    SHA512

    cfeb40a8d1a8e2f8d6efffa0e9c20abb03bc05f0ebe926b984605fce6e63c8ff6a0bb87c9299c4152dd36c8409583c20f8ea628b4f3f9bdfa55c3f0bca1e4fd2

  • memory/908-84-0x000000007EC50000-0x000000007EFA8000-memory.dmp

    Filesize

    3.3MB

  • memory/1020-73-0x000000007EC50000-0x000000007EFA8000-memory.dmp

    Filesize

    3.3MB

  • memory/1252-54-0x000000007ECA0000-0x000000007EFA9000-memory.dmp

    Filesize

    3.0MB

  • memory/1252-61-0x000000007E7F0000-0x000000007EB48000-memory.dmp

    Filesize

    3.3MB

  • memory/1252-59-0x0000000076381000-0x0000000076383000-memory.dmp

    Filesize

    8KB