Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll
Resource
win10v2004-20220812-en
General
-
Target
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll
-
Size
3.5MB
-
MD5
7454d33db10137d3c64663adcc477e3a
-
SHA1
6855f2eabdda3f9af0eafc234f2a354eb6150e6d
-
SHA256
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960
-
SHA512
41ce86848bdcfe698f7082fcc58a345939b3a74f034548feb826348108d2c0e0af21aac31752069cd6a73a5e1afad89b688f8fae06b50bb38f3fd5c290623c98
-
SSDEEP
49152:zLx999999999999999999999999999999999999999999999999999999999999y:H0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1332 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Svae\DqcpbfwhV.jpg rundll32.exe File created C:\Program Files (x86)\Svae\DqcpbfwhV.jpg rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1736 1396 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1396 rundll32.exe Token: SeRestorePrivilege 1396 rundll32.exe Token: SeBackupPrivilege 1396 rundll32.exe Token: SeRestorePrivilege 1396 rundll32.exe Token: SeBackupPrivilege 1396 rundll32.exe Token: SeRestorePrivilege 1396 rundll32.exe Token: SeBackupPrivilege 1396 rundll32.exe Token: SeRestorePrivilege 1396 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1600 wrote to memory of 1396 1600 rundll32.exe 27 PID 1396 wrote to memory of 1736 1396 rundll32.exe 29 PID 1396 wrote to memory of 1736 1396 rundll32.exe 29 PID 1396 wrote to memory of 1736 1396 rundll32.exe 29 PID 1396 wrote to memory of 1736 1396 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 3403⤵
- Program crash
PID:1736
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
PID:1332
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.8MB
MD51e8c39a39f50c98e40ae611856a4ef7c
SHA153c1e46ced3df35a1bb5dc2cdd3002bc3add9502
SHA256e7533617448d3a56f77c58c9a4dba92f335469c26f8cd6193d9208f9bea54236
SHA512a065cc304e1a8e303b9e32c79fbea701fd684ab0f2063a9f6e19c3e6d3ff7da206925d27326be856695c7e0a71300921ec5ca862defae0c025edd3bbb027fb18
-
Filesize
14.8MB
MD51e8c39a39f50c98e40ae611856a4ef7c
SHA153c1e46ced3df35a1bb5dc2cdd3002bc3add9502
SHA256e7533617448d3a56f77c58c9a4dba92f335469c26f8cd6193d9208f9bea54236
SHA512a065cc304e1a8e303b9e32c79fbea701fd684ab0f2063a9f6e19c3e6d3ff7da206925d27326be856695c7e0a71300921ec5ca862defae0c025edd3bbb027fb18