Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 11:21

General

  • Target

    f20cbf5a73592bc6457336fb0f08094076720784a16e9bd50612aae5d1754c9f.dll

  • Size

    157KB

  • MD5

    5ad22a250d11af484e24c88aaf5be6ce

  • SHA1

    955d0026fe4bdf91e5a9e782fd69d11efc5d0575

  • SHA256

    f20cbf5a73592bc6457336fb0f08094076720784a16e9bd50612aae5d1754c9f

  • SHA512

    20a053a5dbac192b3c1d914414b6e4672caf59baaabf3652cdf73b070166b730996861236de4e5329b32d057ade7ceb9bafad3e0b357832004bd14d03bde9ab7

  • SSDEEP

    3072:/TW7sIrOT4w9+529E0vNXWceyikyQ5yJlStS5hSYlzvCz:7W7NyT4wwsvNXJ7sJlzSYw

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f20cbf5a73592bc6457336fb0f08094076720784a16e9bd50612aae5d1754c9f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f20cbf5a73592bc6457336fb0f08094076720784a16e9bd50612aae5d1754c9f.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:4372
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:4608
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4404 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4480
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4404 CREDAT:17414 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2320

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      f8f8086f87156d14091b152fcaadc3ce

      SHA1

      fe3cfbf9e2e871c948300473593dfcf189013386

      SHA256

      8d92f28b70ed5265fafad8b37ce049b0b8ecad038745173acc35a21b8222bf56

      SHA512

      1235be77513694a1478459e999631920be42183a6993dc1f93333831eaa54ea60c7d8617029289c95fed2f861fc7aa79da551c128df4428d23752044eb68ba7a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      709100eac1da4167369e249a18b49a57

      SHA1

      02d1c84fde5bbd916b72098ea812a61e06f695b4

      SHA256

      17472b3482642e890928a78339c12379f1739d1ced407d6f3ee9f079243ce21e

      SHA512

      4fe2b2c0791f34b6400f5e6e3a1804b66c6f8af64825f10630abf3859f9473c4e405f7ce8b7fa50ed61fe2d2590d3e752bb633b87b0b60e1aa0f4ee02f81f478

    • memory/4372-133-0x0000000002DC0000-0x0000000002DD4000-memory.dmp

      Filesize

      80KB

    • memory/4372-135-0x0000000002DF0000-0x0000000002E1B000-memory.dmp

      Filesize

      172KB

    • memory/4372-134-0x0000000002DC0000-0x0000000002DD4000-memory.dmp

      Filesize

      80KB

    • memory/4372-139-0x0000000002DC0000-0x0000000002DD4000-memory.dmp

      Filesize

      80KB