Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
b76b4b8eb90d967e0b7299c7773850a8f2edd64d13ec924ba0966aad1e6b2ddf.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b76b4b8eb90d967e0b7299c7773850a8f2edd64d13ec924ba0966aad1e6b2ddf.dll
Resource
win10v2004-20220812-en
General
-
Target
b76b4b8eb90d967e0b7299c7773850a8f2edd64d13ec924ba0966aad1e6b2ddf.dll
-
Size
222KB
-
MD5
bf5c56128c20c9b250e3ccf5cc14171a
-
SHA1
29ac1a43682ea5347b8e6ef7a24427c494f77b78
-
SHA256
b76b4b8eb90d967e0b7299c7773850a8f2edd64d13ec924ba0966aad1e6b2ddf
-
SHA512
66d836eb065a81fdb96d73d59a64709082dd026a93bb875a9e6beee327d8ccb89d292231e860e56cf721a34b55974dfc06d63999ae582de89330671a0333bed5
-
SSDEEP
3072:EXvXq7YTc//////GqBzPtgXDXvRTVki1ZNXy2Zq:mqsTc//////VWtVki1/CT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5108 inc2f.BBC -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification \??\c:\program files\google\chrome\application\89.0.4389.114\installer\ws2help.dll rundll32.exe File created \??\c:\program files\google\chrome\application\89.0.4389.114\installer\ws2help.dll rundll32.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\application\92.0.902.67\installer\ws2help.dll rundll32.exe File created \??\c:\program files (x86)\microsoft\edge\application\92.0.902.67\installer\ws2help.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4344 5108 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5108 inc2f.BBC -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4904 4980 rundll32.exe 82 PID 4980 wrote to memory of 4904 4980 rundll32.exe 82 PID 4980 wrote to memory of 4904 4980 rundll32.exe 82 PID 4904 wrote to memory of 5108 4904 rundll32.exe 83 PID 4904 wrote to memory of 5108 4904 rundll32.exe 83 PID 4904 wrote to memory of 5108 4904 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b76b4b8eb90d967e0b7299c7773850a8f2edd64d13ec924ba0966aad1e6b2ddf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b76b4b8eb90d967e0b7299c7773850a8f2edd64d13ec924ba0966aad1e6b2ddf.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\inc2f.BBCinc2f.BBC3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 5204⤵
- Program crash
PID:4344
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5108 -ip 51081⤵PID:768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD515f6df7ca649578efb4c4410678e0bb8
SHA116fd9761f19019c493cabb95a6007610f2c6e106
SHA256aeca3d0a31a25d5cab8e0aaa72aa0f8d8cc7560132dc0090bcde43b31647d3b3
SHA512474aa52e6abd3122735bd4fff58ff5a80cba889a6106254105b846d392fa80cc22c9c783d393c5e332f142aef273edd2a1dfbb457ba7b1e51285ba86953cd94d
-
Filesize
207KB
MD515f6df7ca649578efb4c4410678e0bb8
SHA116fd9761f19019c493cabb95a6007610f2c6e106
SHA256aeca3d0a31a25d5cab8e0aaa72aa0f8d8cc7560132dc0090bcde43b31647d3b3
SHA512474aa52e6abd3122735bd4fff58ff5a80cba889a6106254105b846d392fa80cc22c9c783d393c5e332f142aef273edd2a1dfbb457ba7b1e51285ba86953cd94d