Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 06:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll
Resource
win10v2004-20220812-en
General
-
Target
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll
-
Size
3.5MB
-
MD5
7454d33db10137d3c64663adcc477e3a
-
SHA1
6855f2eabdda3f9af0eafc234f2a354eb6150e6d
-
SHA256
8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960
-
SHA512
41ce86848bdcfe698f7082fcc58a345939b3a74f034548feb826348108d2c0e0af21aac31752069cd6a73a5e1afad89b688f8fae06b50bb38f3fd5c290623c98
-
SSDEEP
49152:zLx999999999999999999999999999999999999999999999999999999999999y:H0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4208 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Svae\DqcpbfwhV.jpg rundll32.exe File created C:\Program Files (x86)\Svae\DqcpbfwhV.jpg rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1044 2612 WerFault.exe 80 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2612 rundll32.exe Token: SeRestorePrivilege 2612 rundll32.exe Token: SeBackupPrivilege 2612 rundll32.exe Token: SeRestorePrivilege 2612 rundll32.exe Token: SeBackupPrivilege 2612 rundll32.exe Token: SeRestorePrivilege 2612 rundll32.exe Token: SeBackupPrivilege 2612 rundll32.exe Token: SeRestorePrivilege 2612 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4020 wrote to memory of 2612 4020 rundll32.exe 80 PID 4020 wrote to memory of 2612 4020 rundll32.exe 80 PID 4020 wrote to memory of 2612 4020 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8776e624d9163e54af0924c337fe2dfdfb8613a0b23ded8d0205f0a03ee9b960.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 7283⤵
- Program crash
PID:1044
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2612 -ip 26121⤵PID:4804
Network
-
Remote address:8.8.8.8:53Requestbbs100.codns.comIN AResponsebbs100.codns.comIN A127.0.0.1
-
Remote address:8.8.8.8:53Request97.97.242.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTRResponse
-
-
322 B 7
-
260 B 5
-
-
322 B 7
-
322 B 7
-
260 B 5
-
-
-
62 B 78 B 1 1
DNS Request
bbs100.codns.com
DNS Response
127.0.0.1
-
71 B 145 B 1 1
DNS Request
97.97.242.52.in-addr.arpa
-
118 B 204 B 1 1
DNS Request
2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD5a12c6281586d7861f1602fe2cef0a2ac
SHA138f5a384744c3b8980f114a5b65bff0a3d87af14
SHA256b1b7ac3056d43680bd6b97389cca0d5926a61eaca0ef21167ef9e719f944fc29
SHA5124432442e25e1aa6114b0df46aa3871c5d5728b7660dc99797eca38a61fda4f13ab16d5afe214be70fe95a68a9d236062d688711aedf4b2f7e60515db1be89a50
-
Filesize
11.3MB
MD5a12c6281586d7861f1602fe2cef0a2ac
SHA138f5a384744c3b8980f114a5b65bff0a3d87af14
SHA256b1b7ac3056d43680bd6b97389cca0d5926a61eaca0ef21167ef9e719f944fc29
SHA5124432442e25e1aa6114b0df46aa3871c5d5728b7660dc99797eca38a61fda4f13ab16d5afe214be70fe95a68a9d236062d688711aedf4b2f7e60515db1be89a50