Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
05b8b34640d145a0b2ff6852313ef68e027ec4fad5ba6c7a3f4fe70227a834c8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
05b8b34640d145a0b2ff6852313ef68e027ec4fad5ba6c7a3f4fe70227a834c8.dll
Resource
win10v2004-20220812-en
General
-
Target
05b8b34640d145a0b2ff6852313ef68e027ec4fad5ba6c7a3f4fe70227a834c8.dll
-
Size
220KB
-
MD5
b59ed84dbc08015813c0c130c26e73a0
-
SHA1
b7a5ca241d0e87b5212d239338b7c4ebb196f2cf
-
SHA256
05b8b34640d145a0b2ff6852313ef68e027ec4fad5ba6c7a3f4fe70227a834c8
-
SHA512
bb512c9228e4f4a5313d57e5057674dfa1bc12a3f33b80da9009fbdf0d335f3ac8999a91b120e0dcf32720499d207c6643c6b66d836afc6581c9dda81ee0582c
-
SSDEEP
3072:An4cV8gf2u41Z5tKlz/HotMsckWuKws2ZBkB13nfydzJB7Z10hFW0F:a4y8gOl2poas/WIkj+TtehFRF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x0008000000022e17-135.dat upx behavioral2/files/0x0008000000022e17-136.dat upx behavioral2/memory/2844-137-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 212 2844 WerFault.exe 78 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1140 wrote to memory of 3524 1140 rundll32.exe 77 PID 1140 wrote to memory of 3524 1140 rundll32.exe 77 PID 1140 wrote to memory of 3524 1140 rundll32.exe 77 PID 3524 wrote to memory of 2844 3524 rundll32.exe 78 PID 3524 wrote to memory of 2844 3524 rundll32.exe 78 PID 3524 wrote to memory of 2844 3524 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b8b34640d145a0b2ff6852313ef68e027ec4fad5ba6c7a3f4fe70227a834c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05b8b34640d145a0b2ff6852313ef68e027ec4fad5ba6c7a3f4fe70227a834c8.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 2604⤵
- Program crash
PID:212
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2844 -ip 28441⤵PID:1752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD50344a3aa574e9d0e0f5593ed1b4cb88b
SHA1951fe2b0b4678199676e71838d91dddf762fa79d
SHA25693f2949add56ea8f8f063c3b313ee701f57a208021fafbe6aac3e9a43a6f3ded
SHA51231e4f5a15a7d15938cbd80638230ddb2cc3acd5060d99b4ea061fe1f186e6165755f2724c5bfe7b509a42e4a4612c95920f14d509a3f8c7b68b19e994fa7afdc
-
Filesize
129KB
MD50344a3aa574e9d0e0f5593ed1b4cb88b
SHA1951fe2b0b4678199676e71838d91dddf762fa79d
SHA25693f2949add56ea8f8f063c3b313ee701f57a208021fafbe6aac3e9a43a6f3ded
SHA51231e4f5a15a7d15938cbd80638230ddb2cc3acd5060d99b4ea061fe1f186e6165755f2724c5bfe7b509a42e4a4612c95920f14d509a3f8c7b68b19e994fa7afdc