Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
d5dc83a56fa63c3efdbc8cc69b33e9fb37e86d273b36c90dbd2e674c47534ecd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5dc83a56fa63c3efdbc8cc69b33e9fb37e86d273b36c90dbd2e674c47534ecd.dll
Resource
win10v2004-20221111-en
General
-
Target
d5dc83a56fa63c3efdbc8cc69b33e9fb37e86d273b36c90dbd2e674c47534ecd.dll
-
Size
295KB
-
MD5
bfb47572d8d0261e03e7d8cb6e65aa60
-
SHA1
e508eb2bd9c831eca0c5908f1bf121f69f820640
-
SHA256
d5dc83a56fa63c3efdbc8cc69b33e9fb37e86d273b36c90dbd2e674c47534ecd
-
SHA512
155ef8cd7991bc72471a45185f51301dc3a5d2353b7d28c793276e8f3a29c3df2d06d66b549d7cacaf644f1d3a11849b2c8bcef79c62759f30a34cf085a36d0e
-
SSDEEP
6144:BCIGPj038tAgFMldWNX+sf5SbL18+RnE1HM:qj038t/FMldW420ZRnT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1412 rundll32mgr.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-57.dat upx behavioral1/files/0x00140000000054ab-59.dat upx behavioral1/memory/1412-62-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral1/memory/1412-63-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1396 rundll32.exe 1396 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 816 1396 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 952 wrote to memory of 1396 952 rundll32.exe 27 PID 952 wrote to memory of 1396 952 rundll32.exe 27 PID 952 wrote to memory of 1396 952 rundll32.exe 27 PID 952 wrote to memory of 1396 952 rundll32.exe 27 PID 952 wrote to memory of 1396 952 rundll32.exe 27 PID 952 wrote to memory of 1396 952 rundll32.exe 27 PID 952 wrote to memory of 1396 952 rundll32.exe 27 PID 1396 wrote to memory of 1412 1396 rundll32.exe 28 PID 1396 wrote to memory of 1412 1396 rundll32.exe 28 PID 1396 wrote to memory of 1412 1396 rundll32.exe 28 PID 1396 wrote to memory of 1412 1396 rundll32.exe 28 PID 1396 wrote to memory of 816 1396 rundll32.exe 29 PID 1396 wrote to memory of 816 1396 rundll32.exe 29 PID 1396 wrote to memory of 816 1396 rundll32.exe 29 PID 1396 wrote to memory of 816 1396 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5dc83a56fa63c3efdbc8cc69b33e9fb37e86d273b36c90dbd2e674c47534ecd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5dc83a56fa63c3efdbc8cc69b33e9fb37e86d273b36c90dbd2e674c47534ecd.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:1412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 2283⤵
- Program crash
PID:816
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD50344a3aa574e9d0e0f5593ed1b4cb88b
SHA1951fe2b0b4678199676e71838d91dddf762fa79d
SHA25693f2949add56ea8f8f063c3b313ee701f57a208021fafbe6aac3e9a43a6f3ded
SHA51231e4f5a15a7d15938cbd80638230ddb2cc3acd5060d99b4ea061fe1f186e6165755f2724c5bfe7b509a42e4a4612c95920f14d509a3f8c7b68b19e994fa7afdc
-
Filesize
129KB
MD50344a3aa574e9d0e0f5593ed1b4cb88b
SHA1951fe2b0b4678199676e71838d91dddf762fa79d
SHA25693f2949add56ea8f8f063c3b313ee701f57a208021fafbe6aac3e9a43a6f3ded
SHA51231e4f5a15a7d15938cbd80638230ddb2cc3acd5060d99b4ea061fe1f186e6165755f2724c5bfe7b509a42e4a4612c95920f14d509a3f8c7b68b19e994fa7afdc
-
Filesize
129KB
MD50344a3aa574e9d0e0f5593ed1b4cb88b
SHA1951fe2b0b4678199676e71838d91dddf762fa79d
SHA25693f2949add56ea8f8f063c3b313ee701f57a208021fafbe6aac3e9a43a6f3ded
SHA51231e4f5a15a7d15938cbd80638230ddb2cc3acd5060d99b4ea061fe1f186e6165755f2724c5bfe7b509a42e4a4612c95920f14d509a3f8c7b68b19e994fa7afdc