Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll
Resource
win7-20221111-en
General
-
Target
87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll
-
Size
184KB
-
MD5
2adf539027acb9ad91b89f339241f8fd
-
SHA1
fa9accd7f1bc16254d144090dacf2bef7a7e6bd0
-
SHA256
87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff
-
SHA512
43ffcad4f8d68c949874c9e8ea8c182c5f4e1641340990bc5e1f8edbfdf7706a8c92dcad5b81caa0569a2f09244efb31315acfd3d72bbc984ec294f771628db8
-
SSDEEP
3072:Ln4cV8gf2u41Z5tKlwU+1lSepZ2LD1fvEXqbeE:z4y8gOl2YHSepZUlf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 532 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1492 rundll32.exe 1492 rundll32.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe 936 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 936 532 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 796 wrote to memory of 1492 796 rundll32.exe 28 PID 796 wrote to memory of 1492 796 rundll32.exe 28 PID 796 wrote to memory of 1492 796 rundll32.exe 28 PID 796 wrote to memory of 1492 796 rundll32.exe 28 PID 796 wrote to memory of 1492 796 rundll32.exe 28 PID 796 wrote to memory of 1492 796 rundll32.exe 28 PID 796 wrote to memory of 1492 796 rundll32.exe 28 PID 1492 wrote to memory of 532 1492 rundll32.exe 29 PID 1492 wrote to memory of 532 1492 rundll32.exe 29 PID 1492 wrote to memory of 532 1492 rundll32.exe 29 PID 1492 wrote to memory of 532 1492 rundll32.exe 29 PID 532 wrote to memory of 936 532 rundll32mgr.exe 30 PID 532 wrote to memory of 936 532 rundll32mgr.exe 30 PID 532 wrote to memory of 936 532 rundll32mgr.exe 30 PID 532 wrote to memory of 936 532 rundll32mgr.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:936
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16