Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe
Resource
win10v2004-20220812-en
General
-
Target
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe
-
Size
77KB
-
MD5
45cf86002f7bb2454f28d3bf36ca3533
-
SHA1
0cc550b72a376f8da98014edbe4a2ab054eb410d
-
SHA256
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48
-
SHA512
6b3674896d3e7b30c49e532a98a7ad06513b5058d7673ec3475001668aebd4778237fdc3031cc7b7770b641c06276a00c5d3ae88c9800894ae463ad38297ebd2
-
SSDEEP
1536:+zdFUBIPV8Jq126Pc1N56d65UCJGjhb3rI2FKrasqXR0LSt3GkE:+RBuJLN56A5/cjFQaBXR+0WH
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 9 IoCs
pid Process 556 Rundll32.exe 556 Rundll32.exe 556 Rundll32.exe 556 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe 1532 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\jnr.dll cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe File created C:\Windows\SysWOW64\new.dll cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe -
Launches sc.exe 20 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1508 sc.exe 1632 sc.exe 1868 sc.exe 284 sc.exe 1680 sc.exe 1524 sc.exe 1732 sc.exe 268 sc.exe 592 sc.exe 1824 sc.exe 1652 sc.exe 1692 sc.exe 1936 sc.exe 1352 sc.exe 1192 sc.exe 1168 sc.exe 676 sc.exe 1764 sc.exe 1500 sc.exe 1748 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 556 Rundll32.exe 556 Rundll32.exe 556 Rundll32.exe 556 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 556 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 28 PID 1188 wrote to memory of 556 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 28 PID 1188 wrote to memory of 556 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 28 PID 1188 wrote to memory of 556 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 28 PID 1188 wrote to memory of 556 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 28 PID 1188 wrote to memory of 556 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 28 PID 1188 wrote to memory of 556 1188 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 28 PID 556 wrote to memory of 1168 556 Rundll32.exe 29 PID 556 wrote to memory of 1168 556 Rundll32.exe 29 PID 556 wrote to memory of 1168 556 Rundll32.exe 29 PID 556 wrote to memory of 1168 556 Rundll32.exe 29 PID 556 wrote to memory of 268 556 Rundll32.exe 30 PID 556 wrote to memory of 268 556 Rundll32.exe 30 PID 556 wrote to memory of 268 556 Rundll32.exe 30 PID 556 wrote to memory of 268 556 Rundll32.exe 30 PID 556 wrote to memory of 676 556 Rundll32.exe 32 PID 556 wrote to memory of 676 556 Rundll32.exe 32 PID 556 wrote to memory of 676 556 Rundll32.exe 32 PID 556 wrote to memory of 676 556 Rundll32.exe 32 PID 556 wrote to memory of 592 556 Rundll32.exe 33 PID 556 wrote to memory of 592 556 Rundll32.exe 33 PID 556 wrote to memory of 592 556 Rundll32.exe 33 PID 556 wrote to memory of 592 556 Rundll32.exe 33 PID 556 wrote to memory of 1764 556 Rundll32.exe 36 PID 556 wrote to memory of 1764 556 Rundll32.exe 36 PID 556 wrote to memory of 1764 556 Rundll32.exe 36 PID 556 wrote to memory of 1764 556 Rundll32.exe 36 PID 556 wrote to memory of 1824 556 Rundll32.exe 37 PID 556 wrote to memory of 1824 556 Rundll32.exe 37 PID 556 wrote to memory of 1824 556 Rundll32.exe 37 PID 556 wrote to memory of 1824 556 Rundll32.exe 37 PID 556 wrote to memory of 284 556 Rundll32.exe 38 PID 556 wrote to memory of 284 556 Rundll32.exe 38 PID 556 wrote to memory of 284 556 Rundll32.exe 38 PID 556 wrote to memory of 284 556 Rundll32.exe 38 PID 556 wrote to memory of 1500 556 Rundll32.exe 41 PID 556 wrote to memory of 1500 556 Rundll32.exe 41 PID 556 wrote to memory of 1500 556 Rundll32.exe 41 PID 556 wrote to memory of 1500 556 Rundll32.exe 41 PID 556 wrote to memory of 1508 556 Rundll32.exe 43 PID 556 wrote to memory of 1508 556 Rundll32.exe 43 PID 556 wrote to memory of 1508 556 Rundll32.exe 43 PID 556 wrote to memory of 1508 556 Rundll32.exe 43 PID 556 wrote to memory of 1680 556 Rundll32.exe 46 PID 556 wrote to memory of 1680 556 Rundll32.exe 46 PID 556 wrote to memory of 1680 556 Rundll32.exe 46 PID 556 wrote to memory of 1680 556 Rundll32.exe 46 PID 556 wrote to memory of 1652 556 Rundll32.exe 47 PID 556 wrote to memory of 1652 556 Rundll32.exe 47 PID 556 wrote to memory of 1652 556 Rundll32.exe 47 PID 556 wrote to memory of 1652 556 Rundll32.exe 47 PID 556 wrote to memory of 1692 556 Rundll32.exe 51 PID 556 wrote to memory of 1692 556 Rundll32.exe 51 PID 556 wrote to memory of 1692 556 Rundll32.exe 51 PID 556 wrote to memory of 1692 556 Rundll32.exe 51 PID 556 wrote to memory of 1632 556 Rundll32.exe 52 PID 556 wrote to memory of 1632 556 Rundll32.exe 52 PID 556 wrote to memory of 1632 556 Rundll32.exe 52 PID 556 wrote to memory of 1632 556 Rundll32.exe 52 PID 556 wrote to memory of 1524 556 Rundll32.exe 53 PID 556 wrote to memory of 1524 556 Rundll32.exe 53 PID 556 wrote to memory of 1524 556 Rundll32.exe 53 PID 556 wrote to memory of 1524 556 Rundll32.exe 53 PID 556 wrote to memory of 1936 556 Rundll32.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe"C:\Users\Admin\AppData\Local\Temp\cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\jnr.dll Execute2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\sc.exesc stop 360rp3⤵
- Launches sc.exe
PID:1168
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp3⤵
- Launches sc.exe
PID:268
-
-
C:\Windows\SysWOW64\sc.exesc stop RsRavMon3⤵
- Launches sc.exe
PID:676
-
-
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
PID:592
-
-
C:\Windows\SysWOW64\sc.exesc stop McNASvc3⤵
- Launches sc.exe
PID:1764
-
-
C:\Windows\SysWOW64\sc.exesc delete McNASvc3⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\SysWOW64\sc.exesc stop MpfService3⤵
- Launches sc.exe
PID:284
-
-
C:\Windows\SysWOW64\sc.exesc delete MpfService3⤵
- Launches sc.exe
PID:1500
-
-
C:\Windows\SysWOW64\sc.exesc stop McProxy3⤵
- Launches sc.exe
PID:1508
-
-
C:\Windows\SysWOW64\sc.exesc delete McProxy3⤵
- Launches sc.exe
PID:1680
-
-
C:\Windows\SysWOW64\sc.exesc stop McShield3⤵
- Launches sc.exe
PID:1652
-
-
C:\Windows\SysWOW64\sc.exesc delete McShield3⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\SysWOW64\sc.exesc stop McODS3⤵
- Launches sc.exe
PID:1632
-
-
C:\Windows\SysWOW64\sc.exesc delete McODS3⤵
- Launches sc.exe
PID:1524
-
-
C:\Windows\SysWOW64\sc.exesc stop mcmscsvc3⤵
- Launches sc.exe
PID:1936
-
-
C:\Windows\SysWOW64\sc.exesc delete mcmscsvc3⤵
- Launches sc.exe
PID:1732
-
-
C:\Windows\SysWOW64\sc.exesc stop McSysmon3⤵
- Launches sc.exe
PID:1352
-
-
C:\Windows\SysWOW64\sc.exesc delete McSysmon3⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\SysWOW64\sc.exesc stop ekrn3⤵
- Launches sc.exe
PID:1192
-
-
C:\Windows\SysWOW64\sc.exesc delete ekrn3⤵
- Launches sc.exe
PID:1748
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\new.dll Execute2⤵
- Loads dropped DLL
- Adds Run key to start application
PID:1532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ad6d3b758b0af522d1df51c83ebc9c2b
SHA164b50b3ead339767f9a58922bf092de14c87f8eb
SHA2565e055382c54af491b127340cb3346858b6acc1d3b58be4c93c74b638fe44e092
SHA5123d9d1c56606687b59c12fbe65cd69f785a8103691f4bd5fec15139fb9e6ef250987c24c46d43556cf88e8c3e3f3522d1039ce6ae7c99203cbe69baa1fc84c9ed
-
Filesize
12KB
MD57f934338e10581d1b18a196474ac51e1
SHA14b28911a6ae3ef4e1502a184dd7044633ac7da4a
SHA256a9596721b74f4498b84feccbe92eb76194d48429f8fc4cef438a123a66a249bf
SHA512ab8fc0492ffdd13f30f83d6814e2cb43c56e812d9b978a4f47a6a8af9e02f57d4f43a72819e7181d9a709c86cfc63cb957de06f9d9f1eba730ee3842a872fe0d
-
Filesize
8KB
MD58c96dd6d4bbb740396025dbad40d5412
SHA12cf230b0a57707a5d05ed61f5a0b1efaacd6ef94
SHA256e805e5a4ca410a50388dafae97fa7a67dff55bd7435e29480252c8542dd01051
SHA5125585a305e56da595b02cde74cd2a41ada8d95468b4b28d80d97b58ce8465320fad5c09636585e37fe5afe036f7eee811fd778a3d320eabdaf2b0df69371b5fcf
-
Filesize
11KB
MD5ad6d3b758b0af522d1df51c83ebc9c2b
SHA164b50b3ead339767f9a58922bf092de14c87f8eb
SHA2565e055382c54af491b127340cb3346858b6acc1d3b58be4c93c74b638fe44e092
SHA5123d9d1c56606687b59c12fbe65cd69f785a8103691f4bd5fec15139fb9e6ef250987c24c46d43556cf88e8c3e3f3522d1039ce6ae7c99203cbe69baa1fc84c9ed
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6
-
Filesize
12KB
MD57f934338e10581d1b18a196474ac51e1
SHA14b28911a6ae3ef4e1502a184dd7044633ac7da4a
SHA256a9596721b74f4498b84feccbe92eb76194d48429f8fc4cef438a123a66a249bf
SHA512ab8fc0492ffdd13f30f83d6814e2cb43c56e812d9b978a4f47a6a8af9e02f57d4f43a72819e7181d9a709c86cfc63cb957de06f9d9f1eba730ee3842a872fe0d
-
Filesize
12KB
MD57f934338e10581d1b18a196474ac51e1
SHA14b28911a6ae3ef4e1502a184dd7044633ac7da4a
SHA256a9596721b74f4498b84feccbe92eb76194d48429f8fc4cef438a123a66a249bf
SHA512ab8fc0492ffdd13f30f83d6814e2cb43c56e812d9b978a4f47a6a8af9e02f57d4f43a72819e7181d9a709c86cfc63cb957de06f9d9f1eba730ee3842a872fe0d
-
Filesize
12KB
MD57f934338e10581d1b18a196474ac51e1
SHA14b28911a6ae3ef4e1502a184dd7044633ac7da4a
SHA256a9596721b74f4498b84feccbe92eb76194d48429f8fc4cef438a123a66a249bf
SHA512ab8fc0492ffdd13f30f83d6814e2cb43c56e812d9b978a4f47a6a8af9e02f57d4f43a72819e7181d9a709c86cfc63cb957de06f9d9f1eba730ee3842a872fe0d
-
Filesize
12KB
MD57f934338e10581d1b18a196474ac51e1
SHA14b28911a6ae3ef4e1502a184dd7044633ac7da4a
SHA256a9596721b74f4498b84feccbe92eb76194d48429f8fc4cef438a123a66a249bf
SHA512ab8fc0492ffdd13f30f83d6814e2cb43c56e812d9b978a4f47a6a8af9e02f57d4f43a72819e7181d9a709c86cfc63cb957de06f9d9f1eba730ee3842a872fe0d
-
Filesize
8KB
MD58c96dd6d4bbb740396025dbad40d5412
SHA12cf230b0a57707a5d05ed61f5a0b1efaacd6ef94
SHA256e805e5a4ca410a50388dafae97fa7a67dff55bd7435e29480252c8542dd01051
SHA5125585a305e56da595b02cde74cd2a41ada8d95468b4b28d80d97b58ce8465320fad5c09636585e37fe5afe036f7eee811fd778a3d320eabdaf2b0df69371b5fcf
-
Filesize
8KB
MD58c96dd6d4bbb740396025dbad40d5412
SHA12cf230b0a57707a5d05ed61f5a0b1efaacd6ef94
SHA256e805e5a4ca410a50388dafae97fa7a67dff55bd7435e29480252c8542dd01051
SHA5125585a305e56da595b02cde74cd2a41ada8d95468b4b28d80d97b58ce8465320fad5c09636585e37fe5afe036f7eee811fd778a3d320eabdaf2b0df69371b5fcf
-
Filesize
8KB
MD58c96dd6d4bbb740396025dbad40d5412
SHA12cf230b0a57707a5d05ed61f5a0b1efaacd6ef94
SHA256e805e5a4ca410a50388dafae97fa7a67dff55bd7435e29480252c8542dd01051
SHA5125585a305e56da595b02cde74cd2a41ada8d95468b4b28d80d97b58ce8465320fad5c09636585e37fe5afe036f7eee811fd778a3d320eabdaf2b0df69371b5fcf
-
Filesize
8KB
MD58c96dd6d4bbb740396025dbad40d5412
SHA12cf230b0a57707a5d05ed61f5a0b1efaacd6ef94
SHA256e805e5a4ca410a50388dafae97fa7a67dff55bd7435e29480252c8542dd01051
SHA5125585a305e56da595b02cde74cd2a41ada8d95468b4b28d80d97b58ce8465320fad5c09636585e37fe5afe036f7eee811fd778a3d320eabdaf2b0df69371b5fcf