Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
c7ef1385ab7d9cfbdae403a28ca14a6abda5cf218837e4d04247b642151ed966.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7ef1385ab7d9cfbdae403a28ca14a6abda5cf218837e4d04247b642151ed966.dll
Resource
win10v2004-20220901-en
General
-
Target
c7ef1385ab7d9cfbdae403a28ca14a6abda5cf218837e4d04247b642151ed966.dll
-
Size
472KB
-
MD5
eeaac30a1688f59236aa5127644d6cc0
-
SHA1
61008c2b82ea846993d526daa0e85981b0583239
-
SHA256
c7ef1385ab7d9cfbdae403a28ca14a6abda5cf218837e4d04247b642151ed966
-
SHA512
21ae16d90248bcd8a94a4953661b86346c9daaaf63e71afbbd6bc600e040630bedca40620e9449b423f7c72e6fa52ae69fd0156109a985991b62b54dbd3c1bcb
-
SSDEEP
12288:jehnaNPpSVZmNxRCwnwm3W3OHIIf53VO:jeh0PpS6NxNnwYeOHXD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2164 rundll32Srv.exe -
resource yara_rule behavioral2/files/0x0001000000022e00-134.dat upx behavioral2/files/0x0001000000022e00-135.dat upx behavioral2/memory/2164-137-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3772 5044 WerFault.exe 81 3812 2164 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4180 wrote to memory of 5044 4180 rundll32.exe 81 PID 4180 wrote to memory of 5044 4180 rundll32.exe 81 PID 4180 wrote to memory of 5044 4180 rundll32.exe 81 PID 5044 wrote to memory of 2164 5044 rundll32.exe 82 PID 5044 wrote to memory of 2164 5044 rundll32.exe 82 PID 5044 wrote to memory of 2164 5044 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7ef1385ab7d9cfbdae403a28ca14a6abda5cf218837e4d04247b642151ed966.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7ef1385ab7d9cfbdae403a28ca14a6abda5cf218837e4d04247b642151ed966.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 2684⤵
- Program crash
PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 6163⤵
- Program crash
PID:3772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2164 -ip 21641⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5044 -ip 50441⤵PID:4196
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5dba1231fa077c41836df91398093d5a8
SHA19bd1adff712907f1cbff38194e7229af5d9b2938
SHA25610576d998ccc0c450ac3bb8199eda18f5dd01336101eb1cfe357f33b520b5f0a
SHA512ec8f9d266a926010b94cb244e2ef90704a1209cafa18d80af9637fa81d56a929aa2a9d4ebbdd1b86a1d9cf632ddbd0f0f86e5894aa8248784518f2153e509a1f
-
Filesize
90KB
MD5dba1231fa077c41836df91398093d5a8
SHA19bd1adff712907f1cbff38194e7229af5d9b2938
SHA25610576d998ccc0c450ac3bb8199eda18f5dd01336101eb1cfe357f33b520b5f0a
SHA512ec8f9d266a926010b94cb244e2ef90704a1209cafa18d80af9637fa81d56a929aa2a9d4ebbdd1b86a1d9cf632ddbd0f0f86e5894aa8248784518f2153e509a1f