Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll
Resource
win10v2004-20221111-en
General
-
Target
7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll
-
Size
233KB
-
MD5
1b173632ce8c8478d9a4b3c3a3b53b60
-
SHA1
25b5c15bb8a70afc440e8cecf93b85d4e36cdcd9
-
SHA256
7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79
-
SHA512
6da423a1a21b6e22ec89dec18b4502ea367bc34de465022e3fbac11b4c855aac510097e6277065d8e967ce382282df9d9ad48b8042570b48349fdf0331818c9f
-
SSDEEP
3072:2Qadi1TFsLSLZwL4vxu587buCd7OWx9WLak0M1zLlUrbrqBJ4I/cQ5NYd4OpAidT:2XIr9wuu5895j/I10M1E/c0byMPKtunD
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Windows Share = "RunDll32 \"C:\\Program Files (x86)\\Common Files\\microsoft shared\\PROOF\\lsaperf.dll\",Init" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\spp\tokens\srvsrv.dll rundll32.exe File created C:\Windows\SysWOW64\spp\tokens\srvsrv.dll rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\lsaperf.dll rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\lsaperf.dll rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\NetworkService\hostsvc.dll rundll32.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\hostsvc.dll rundll32.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0 rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral rundll32.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 276 rundll32.exe 276 rundll32.exe 276 rundll32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 344 wrote to memory of 276 344 rundll32.exe 28 PID 344 wrote to memory of 276 344 rundll32.exe 28 PID 344 wrote to memory of 276 344 rundll32.exe 28 PID 344 wrote to memory of 276 344 rundll32.exe 28 PID 344 wrote to memory of 276 344 rundll32.exe 28 PID 344 wrote to memory of 276 344 rundll32.exe 28 PID 344 wrote to memory of 276 344 rundll32.exe 28 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 1132 276 rundll32.exe 12 PID 276 wrote to memory of 1132 276 rundll32.exe 12 PID 276 wrote to memory of 1172 276 rundll32.exe 14 PID 276 wrote to memory of 1172 276 rundll32.exe 14 PID 276 wrote to memory of 1204 276 rundll32.exe 16 PID 276 wrote to memory of 1204 276 rundll32.exe 16 PID 276 wrote to memory of 344 276 rundll32.exe 27 PID 276 wrote to memory of 344 276 rundll32.exe 27 PID 276 wrote to memory of 564 276 rundll32.exe 29 PID 276 wrote to memory of 564 276 rundll32.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll,#13⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32 "C:\Users\Admin\AppData\Local\Temp\7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll",Init4⤵PID:564
-
-
-