Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
f8bfb3f0ca34247d2bb83342f7f00c0ebc38a94666f452e9465f7d044131b17f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f8bfb3f0ca34247d2bb83342f7f00c0ebc38a94666f452e9465f7d044131b17f.dll
Resource
win10v2004-20220812-en
General
-
Target
f8bfb3f0ca34247d2bb83342f7f00c0ebc38a94666f452e9465f7d044131b17f.dll
-
Size
121KB
-
MD5
f410de894a127b5a36da9d3572f6e9eb
-
SHA1
3f3a54399f741978193095bf023606579e6644a4
-
SHA256
f8bfb3f0ca34247d2bb83342f7f00c0ebc38a94666f452e9465f7d044131b17f
-
SHA512
68114b57e81292868a1d9cb249ef4d161467da85e4f6dfd5a5fe7bb137ad75f84aef17a814b4d5e00af43cdfe0c95b30383ec5b9cf92a2b86049aade10a82750
-
SSDEEP
3072:N6LVF6AYmBVEiNBah3dGV7LpEP9kCCorEP4+9J6ig989gc:wLci03oEP9kCCorU4+zg2
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\3de01880\imagepath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\EACD.tmp" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1004 1884 WerFault.exe 28 -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1884 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1884 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 780 wrote to memory of 1884 780 rundll32.exe 28 PID 780 wrote to memory of 1884 780 rundll32.exe 28 PID 780 wrote to memory of 1884 780 rundll32.exe 28 PID 780 wrote to memory of 1884 780 rundll32.exe 28 PID 780 wrote to memory of 1884 780 rundll32.exe 28 PID 780 wrote to memory of 1884 780 rundll32.exe 28 PID 780 wrote to memory of 1884 780 rundll32.exe 28 PID 1884 wrote to memory of 1004 1884 rundll32.exe 29 PID 1884 wrote to memory of 1004 1884 rundll32.exe 29 PID 1884 wrote to memory of 1004 1884 rundll32.exe 29 PID 1884 wrote to memory of 1004 1884 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8bfb3f0ca34247d2bb83342f7f00c0ebc38a94666f452e9465f7d044131b17f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8bfb3f0ca34247d2bb83342f7f00c0ebc38a94666f452e9465f7d044131b17f.dll,#12⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 2963⤵
- Program crash
PID:1004
-
-