Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
d0838f8688dd42d6441c63f1cc18f135996b4b37c240e26cec3b102aee20a52b.dll
Resource
win7-20220812-en
General
-
Target
d0838f8688dd42d6441c63f1cc18f135996b4b37c240e26cec3b102aee20a52b.dll
-
Size
622KB
-
MD5
0410cb071b28551a84b14f8fd635131f
-
SHA1
b4e952344d2ed614c6c88c1fdff8382a58e4e790
-
SHA256
d0838f8688dd42d6441c63f1cc18f135996b4b37c240e26cec3b102aee20a52b
-
SHA512
afbe2b9cc7d1176463d29d067c99832d2fa72337d5f11e0046299c045e4fe398cad677e481fb319652e16d5f378665f9c17acae65789671e858c0467285dd84d
-
SSDEEP
12288:8h8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMNRTiJJ3tSOK8:88F+Pzr/Hfp4MIYwZckMQmRPOK8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1400 rundll32mgr.exe 1076 rundll32mgrmgr.exe -
Loads dropped DLL 18 IoCs
pid Process 1432 rundll32.exe 1432 rundll32.exe 1400 rundll32mgr.exe 1400 rundll32mgr.exe 2004 WerFault.exe 852 WerFault.exe 852 WerFault.exe 2004 WerFault.exe 852 WerFault.exe 852 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 852 WerFault.exe 2004 WerFault.exe 852 WerFault.exe 2004 WerFault.exe 852 WerFault.exe 2004 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 852 1400 WerFault.exe 29 2004 1076 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 576 wrote to memory of 1432 576 rundll32.exe 28 PID 576 wrote to memory of 1432 576 rundll32.exe 28 PID 576 wrote to memory of 1432 576 rundll32.exe 28 PID 576 wrote to memory of 1432 576 rundll32.exe 28 PID 576 wrote to memory of 1432 576 rundll32.exe 28 PID 576 wrote to memory of 1432 576 rundll32.exe 28 PID 576 wrote to memory of 1432 576 rundll32.exe 28 PID 1432 wrote to memory of 1400 1432 rundll32.exe 29 PID 1432 wrote to memory of 1400 1432 rundll32.exe 29 PID 1432 wrote to memory of 1400 1432 rundll32.exe 29 PID 1432 wrote to memory of 1400 1432 rundll32.exe 29 PID 1400 wrote to memory of 1076 1400 rundll32mgr.exe 30 PID 1400 wrote to memory of 1076 1400 rundll32mgr.exe 30 PID 1400 wrote to memory of 1076 1400 rundll32mgr.exe 30 PID 1400 wrote to memory of 1076 1400 rundll32mgr.exe 30 PID 1076 wrote to memory of 2004 1076 rundll32mgrmgr.exe 32 PID 1076 wrote to memory of 2004 1076 rundll32mgrmgr.exe 32 PID 1076 wrote to memory of 2004 1076 rundll32mgrmgr.exe 32 PID 1076 wrote to memory of 2004 1076 rundll32mgrmgr.exe 32 PID 1400 wrote to memory of 852 1400 rundll32mgr.exe 31 PID 1400 wrote to memory of 852 1400 rundll32mgr.exe 31 PID 1400 wrote to memory of 852 1400 rundll32mgr.exe 31 PID 1400 wrote to memory of 852 1400 rundll32mgr.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0838f8688dd42d6441c63f1cc18f135996b4b37c240e26cec3b102aee20a52b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0838f8688dd42d6441c63f1cc18f135996b4b37c240e26cec3b102aee20a52b.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 1005⤵
- Loads dropped DLL
- Program crash
PID:2004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:852
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
186KB
MD5f944fdb0929660b9d7626ee746f531bf
SHA1a5e053e6f8c3b2af2f2ce89412bf6b95e1a0f1e5
SHA256e24a5028e40fa02f1a0e9420df48efa2b67acc4d3a2a5c45d4f6653e9334d7a8
SHA512917a8f0b84968f6e2d0d28a2afc39088344eaf946bbc006712413905acfe07b5fbabdb28ae15acdf5c38a2cf4cf7ca1766f34fd5dc3f339d8425a43825f05a53
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483
-
Filesize
92KB
MD5f6830df60354eff567ac1906e9db1ae6
SHA1be512d8136aace9ec6d74cd96bd0f0d970a427e3
SHA2565f0102011f16261efdbb31df52316e2307d4c9a3a3bc9b3a462f07191432d616
SHA51280a33e363ccec283a47254a13b3ac3d7784c2e672c5843de8ddd01630722c72b2e25745331a6f8eee240e7407ced6ae56bd4dbf9ac92b2dde9406217a4c8f483