Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    186s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 02:43

General

  • Target

    7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll

  • Size

    233KB

  • MD5

    1b173632ce8c8478d9a4b3c3a3b53b60

  • SHA1

    25b5c15bb8a70afc440e8cecf93b85d4e36cdcd9

  • SHA256

    7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79

  • SHA512

    6da423a1a21b6e22ec89dec18b4502ea367bc34de465022e3fbac11b4c855aac510097e6277065d8e967ce382282df9d9ad48b8042570b48349fdf0331818c9f

  • SSDEEP

    3072:2Qadi1TFsLSLZwL4vxu587buCd7OWx9WLak0M1zLlUrbrqBJ4I/cQ5NYd4OpAidT:2XIr9wuu5895j/I10M1E/c0byMPKtunD

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1132
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1204
          • C:\Windows\system32\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll,#1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:344
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe C:\Users\Admin\AppData\Local\Temp\7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll,#1
              3⤵
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:276
              • C:\Windows\SysWOW64\RunDll32.exe
                RunDll32 "C:\Users\Admin\AppData\Local\Temp\7f5bc40b0116497652dbd25d53ecd35364a218ed42fb53f0929e2d2c0e097a79.dll",Init
                4⤵
                  PID:564

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/276-55-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

            Filesize

            8KB

          • memory/276-56-0x00000000751F0000-0x000000007523F000-memory.dmp

            Filesize

            316KB

          • memory/276-57-0x0000000075240000-0x000000007528F000-memory.dmp

            Filesize

            316KB

          • memory/276-58-0x00000000751F0000-0x000000007523F000-memory.dmp

            Filesize

            316KB

          • memory/276-59-0x0000000075240000-0x000000007528F000-memory.dmp

            Filesize

            316KB

          • memory/276-73-0x00000000751F0000-0x000000007523F000-memory.dmp

            Filesize

            316KB

          • memory/564-74-0x00000000751F0000-0x000000007523F000-memory.dmp

            Filesize

            316KB

          • memory/1132-63-0x0000000001C80000-0x0000000001C81000-memory.dmp

            Filesize

            4KB