Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
7e41f43275f79de584731ac3682d085df368ec8e844bf3f763d28378132b4849.dll
Resource
win7-20220812-en
General
-
Target
7e41f43275f79de584731ac3682d085df368ec8e844bf3f763d28378132b4849.dll
-
Size
160KB
-
MD5
f17a942c372ace091d4e3326b654f911
-
SHA1
1a13fcb856dd00683674b81ffb40f9b8b4275f10
-
SHA256
7e41f43275f79de584731ac3682d085df368ec8e844bf3f763d28378132b4849
-
SHA512
69d12a47223f04f8e21b30f662de56eeba68c9f98fb3dc9aa864f89bb439e069947b982f72ea91a73034ba1142e5b3e382463cf45af4dbc7e8a1c9d2647bfbb0
-
SSDEEP
3072:K61Ye3TaEu2CoCcn3zO7A4D8XHLC/6CqX2n2sv566sJrlcWAP:HTa12CoCckAe87CnqX2L4JrlcLP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 968 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1800 rundll32.exe 1800 rundll32.exe 1404 WerFault.exe 1404 WerFault.exe 1404 WerFault.exe 1404 WerFault.exe 1404 WerFault.exe 1404 WerFault.exe 1404 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1404 968 WerFault.exe 28 2036 1800 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 288 wrote to memory of 1800 288 rundll32.exe 27 PID 288 wrote to memory of 1800 288 rundll32.exe 27 PID 288 wrote to memory of 1800 288 rundll32.exe 27 PID 288 wrote to memory of 1800 288 rundll32.exe 27 PID 288 wrote to memory of 1800 288 rundll32.exe 27 PID 288 wrote to memory of 1800 288 rundll32.exe 27 PID 288 wrote to memory of 1800 288 rundll32.exe 27 PID 1800 wrote to memory of 968 1800 rundll32.exe 28 PID 1800 wrote to memory of 968 1800 rundll32.exe 28 PID 1800 wrote to memory of 968 1800 rundll32.exe 28 PID 1800 wrote to memory of 968 1800 rundll32.exe 28 PID 968 wrote to memory of 1404 968 rundll32mgr.exe 29 PID 968 wrote to memory of 1404 968 rundll32mgr.exe 29 PID 968 wrote to memory of 1404 968 rundll32mgr.exe 29 PID 968 wrote to memory of 1404 968 rundll32mgr.exe 29 PID 1800 wrote to memory of 2036 1800 rundll32.exe 30 PID 1800 wrote to memory of 2036 1800 rundll32.exe 30 PID 1800 wrote to memory of 2036 1800 rundll32.exe 30 PID 1800 wrote to memory of 2036 1800 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e41f43275f79de584731ac3682d085df368ec8e844bf3f763d28378132b4849.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e41f43275f79de584731ac3682d085df368ec8e844bf3f763d28378132b4849.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 924⤵
- Loads dropped DLL
- Program crash
PID:1404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 2283⤵
- Program crash
PID:2036
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79
-
Filesize
95KB
MD58e617cbfd82e7d8b1e714f2b4f27d84f
SHA1bcf77c9799fd933f23ce344d2c46081dec46ebb2
SHA25675b0313a8289f2e8bef73aa7599d96e661b6d3840fb32d330bc3cd924240b69e
SHA5123809686bd7d4c03cab6ce7e438115ecf224955fe55d2c8784e16d9df1d30c86b047017536435e059a9bda2e30a29263139336ebcab662d2a281f9c7dc2792d79