Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    175s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 03:46 UTC

General

  • Target

    6eef2393b685423ac602107cb18afda938f5d8f769921403cd6e99ec125e4ee9.dll

  • Size

    236KB

  • MD5

    f656ad6fa2e4d14360f2c3da120b3d40

  • SHA1

    102cf8ebc6f372ee9c30798befb7696cbade12c5

  • SHA256

    6eef2393b685423ac602107cb18afda938f5d8f769921403cd6e99ec125e4ee9

  • SHA512

    276fb5b909bcedb72960484b1a090f760d9c887313d448db1e7f5f928d90a2f34e0c02eadda222b60c7a93985f06e3e5793d35ec4128edda852b0b501cc0118e

  • SSDEEP

    3072:SeqmgHwlaazN9U3J+P0wFp+bLrt2wkkIh:+Qj9U3jwO3rt5u

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6eef2393b685423ac602107cb18afda938f5d8f769921403cd6e99ec125e4ee9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6eef2393b685423ac602107cb18afda938f5d8f769921403cd6e99ec125e4ee9.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4528

Network

  • flag-unknown
    DNS
    176.122.125.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    176.122.125.40.in-addr.arpa
    IN PTR
    Response
  • flag-unknown
    DNS
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    IN PTR
    Response
  • 20.42.73.26:443
    322 B
    7
  • 8.238.111.126:80
    260 B
    5
  • 8.238.111.126:80
    322 B
    7
  • 93.184.220.29:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 67.26.111.254:80
    260 B
    5
  • 8.238.111.126:80
    322 B
    7
  • 8.238.111.126:80
    322 B
    7
  • 67.24.35.254:80
    260 B
    5
  • 8.247.211.254:80
    260 B
    5
  • 8.253.208.120:80
    260 B
    5
  • 8.8.8.8:53
    176.122.125.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    176.122.125.40.in-addr.arpa

  • 8.8.8.8:53
    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa
    dns
    118 B
    204 B
    1
    1

    DNS Request

    9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.2.0.0.0.0.2.0.1.3.0.6.2.ip6.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\gitfg.dll

    Filesize

    478KB

    MD5

    e99416267b61f52fa5ab994019efd359

    SHA1

    86d31eae707db7fe51d2556394fcf0e8e9f6b0fd

    SHA256

    768c286674371564b5e6095edb56e0a4231f341be895da69cfccca5160029774

    SHA512

    0a1c7579a9c787c2c1bef35f0660e72e74b42824e14ebea63b87ed25ddaf107e3746567bb431cab41a2f6719fad2c22d96e0715a1fe085d75805d7d66f7f05ae

  • memory/4528-134-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4528-135-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.