Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe
Resource
win10v2004-20220812-en
General
-
Target
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe
-
Size
77KB
-
MD5
45cf86002f7bb2454f28d3bf36ca3533
-
SHA1
0cc550b72a376f8da98014edbe4a2ab054eb410d
-
SHA256
cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48
-
SHA512
6b3674896d3e7b30c49e532a98a7ad06513b5058d7673ec3475001668aebd4778237fdc3031cc7b7770b641c06276a00c5d3ae88c9800894ae463ad38297ebd2
-
SSDEEP
1536:+zdFUBIPV8Jq126Pc1N56d65UCJGjhb3rI2FKrasqXR0LSt3GkE:+RBuJLN56A5/cjFQaBXR+0WH
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 3 IoCs
pid Process 404 Rundll32.exe 4708 Rundll32.exe 4708 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\heha.dll cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe File created C:\Windows\SysWOW64\shia.dll cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe -
Launches sc.exe 20 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2316 sc.exe 3940 sc.exe 2684 sc.exe 2200 sc.exe 3508 sc.exe 4080 sc.exe 224 sc.exe 3484 sc.exe 1060 sc.exe 5084 sc.exe 4664 sc.exe 3092 sc.exe 4176 sc.exe 4924 sc.exe 2568 sc.exe 3936 sc.exe 3644 sc.exe 3360 sc.exe 1056 sc.exe 5044 sc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 404 Rundll32.exe 404 Rundll32.exe 404 Rundll32.exe 404 Rundll32.exe 404 Rundll32.exe 404 Rundll32.exe 404 Rundll32.exe 404 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3156 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 404 3156 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 79 PID 3156 wrote to memory of 404 3156 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 79 PID 3156 wrote to memory of 404 3156 cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe 79 PID 404 wrote to memory of 4664 404 Rundll32.exe 80 PID 404 wrote to memory of 4664 404 Rundll32.exe 80 PID 404 wrote to memory of 4664 404 Rundll32.exe 80 PID 404 wrote to memory of 3092 404 Rundll32.exe 81 PID 404 wrote to memory of 3092 404 Rundll32.exe 81 PID 404 wrote to memory of 3092 404 Rundll32.exe 81 PID 404 wrote to memory of 3936 404 Rundll32.exe 82 PID 404 wrote to memory of 3936 404 Rundll32.exe 82 PID 404 wrote to memory of 3936 404 Rundll32.exe 82 PID 404 wrote to memory of 4176 404 Rundll32.exe 85 PID 404 wrote to memory of 4176 404 Rundll32.exe 85 PID 404 wrote to memory of 4176 404 Rundll32.exe 85 PID 404 wrote to memory of 4924 404 Rundll32.exe 87 PID 404 wrote to memory of 4924 404 Rundll32.exe 87 PID 404 wrote to memory of 4924 404 Rundll32.exe 87 PID 404 wrote to memory of 2200 404 Rundll32.exe 88 PID 404 wrote to memory of 2200 404 Rundll32.exe 88 PID 404 wrote to memory of 2200 404 Rundll32.exe 88 PID 404 wrote to memory of 2316 404 Rundll32.exe 91 PID 404 wrote to memory of 2316 404 Rundll32.exe 91 PID 404 wrote to memory of 2316 404 Rundll32.exe 91 PID 404 wrote to memory of 3508 404 Rundll32.exe 92 PID 404 wrote to memory of 3508 404 Rundll32.exe 92 PID 404 wrote to memory of 3508 404 Rundll32.exe 92 PID 404 wrote to memory of 4080 404 Rundll32.exe 94 PID 404 wrote to memory of 4080 404 Rundll32.exe 94 PID 404 wrote to memory of 4080 404 Rundll32.exe 94 PID 404 wrote to memory of 2568 404 Rundll32.exe 97 PID 404 wrote to memory of 2568 404 Rundll32.exe 97 PID 404 wrote to memory of 2568 404 Rundll32.exe 97 PID 404 wrote to memory of 3940 404 Rundll32.exe 101 PID 404 wrote to memory of 3940 404 Rundll32.exe 101 PID 404 wrote to memory of 3940 404 Rundll32.exe 101 PID 404 wrote to memory of 1060 404 Rundll32.exe 98 PID 404 wrote to memory of 1060 404 Rundll32.exe 98 PID 404 wrote to memory of 1060 404 Rundll32.exe 98 PID 404 wrote to memory of 224 404 Rundll32.exe 104 PID 404 wrote to memory of 224 404 Rundll32.exe 104 PID 404 wrote to memory of 224 404 Rundll32.exe 104 PID 404 wrote to memory of 2684 404 Rundll32.exe 105 PID 404 wrote to memory of 2684 404 Rundll32.exe 105 PID 404 wrote to memory of 2684 404 Rundll32.exe 105 PID 404 wrote to memory of 3644 404 Rundll32.exe 107 PID 404 wrote to memory of 3644 404 Rundll32.exe 107 PID 404 wrote to memory of 3644 404 Rundll32.exe 107 PID 404 wrote to memory of 5084 404 Rundll32.exe 111 PID 404 wrote to memory of 5084 404 Rundll32.exe 111 PID 404 wrote to memory of 5084 404 Rundll32.exe 111 PID 404 wrote to memory of 3360 404 Rundll32.exe 109 PID 404 wrote to memory of 3360 404 Rundll32.exe 109 PID 404 wrote to memory of 3360 404 Rundll32.exe 109 PID 404 wrote to memory of 1056 404 Rundll32.exe 112 PID 404 wrote to memory of 1056 404 Rundll32.exe 112 PID 404 wrote to memory of 1056 404 Rundll32.exe 112 PID 404 wrote to memory of 3484 404 Rundll32.exe 116 PID 404 wrote to memory of 3484 404 Rundll32.exe 116 PID 404 wrote to memory of 3484 404 Rundll32.exe 116 PID 404 wrote to memory of 5044 404 Rundll32.exe 117 PID 404 wrote to memory of 5044 404 Rundll32.exe 117 PID 404 wrote to memory of 5044 404 Rundll32.exe 117 PID 404 wrote to memory of 3156 404 Rundll32.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe"C:\Users\Admin\AppData\Local\Temp\cdda4da404352e01a464704c195aa6ef42a876b6e38cc66f63d3d94285c0cc48.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\heha.dll Execute2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\sc.exesc stop 360rp3⤵
- Launches sc.exe
PID:4664
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp3⤵
- Launches sc.exe
PID:3092
-
-
C:\Windows\SysWOW64\sc.exesc stop RsRavMon3⤵
- Launches sc.exe
PID:3936
-
-
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
PID:4176
-
-
C:\Windows\SysWOW64\sc.exesc stop McNASvc3⤵
- Launches sc.exe
PID:4924
-
-
C:\Windows\SysWOW64\sc.exesc delete McNASvc3⤵
- Launches sc.exe
PID:2200
-
-
C:\Windows\SysWOW64\sc.exesc stop MpfService3⤵
- Launches sc.exe
PID:2316
-
-
C:\Windows\SysWOW64\sc.exesc delete MpfService3⤵
- Launches sc.exe
PID:3508
-
-
C:\Windows\SysWOW64\sc.exesc stop McProxy3⤵
- Launches sc.exe
PID:4080
-
-
C:\Windows\SysWOW64\sc.exesc delete McProxy3⤵
- Launches sc.exe
PID:2568
-
-
C:\Windows\SysWOW64\sc.exesc delete McShield3⤵
- Launches sc.exe
PID:1060
-
-
C:\Windows\SysWOW64\sc.exesc stop McShield3⤵
- Launches sc.exe
PID:3940
-
-
C:\Windows\SysWOW64\sc.exesc stop McODS3⤵
- Launches sc.exe
PID:224
-
-
C:\Windows\SysWOW64\sc.exesc delete McODS3⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\SysWOW64\sc.exesc stop mcmscsvc3⤵
- Launches sc.exe
PID:3644
-
-
C:\Windows\SysWOW64\sc.exesc stop McSysmon3⤵
- Launches sc.exe
PID:3360
-
-
C:\Windows\SysWOW64\sc.exesc delete mcmscsvc3⤵
- Launches sc.exe
PID:5084
-
-
C:\Windows\SysWOW64\sc.exesc delete McSysmon3⤵
- Launches sc.exe
PID:1056
-
-
C:\Windows\SysWOW64\sc.exesc stop ekrn3⤵
- Launches sc.exe
PID:3484
-
-
C:\Windows\SysWOW64\sc.exesc delete ekrn3⤵
- Launches sc.exe
PID:5044
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\shia.dll Execute2⤵
- Loads dropped DLL
- Adds Run key to start application
PID:4708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ad6d3b758b0af522d1df51c83ebc9c2b
SHA164b50b3ead339767f9a58922bf092de14c87f8eb
SHA2565e055382c54af491b127340cb3346858b6acc1d3b58be4c93c74b638fe44e092
SHA5123d9d1c56606687b59c12fbe65cd69f785a8103691f4bd5fec15139fb9e6ef250987c24c46d43556cf88e8c3e3f3522d1039ce6ae7c99203cbe69baa1fc84c9ed
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
12KB
MD57f934338e10581d1b18a196474ac51e1
SHA14b28911a6ae3ef4e1502a184dd7044633ac7da4a
SHA256a9596721b74f4498b84feccbe92eb76194d48429f8fc4cef438a123a66a249bf
SHA512ab8fc0492ffdd13f30f83d6814e2cb43c56e812d9b978a4f47a6a8af9e02f57d4f43a72819e7181d9a709c86cfc63cb957de06f9d9f1eba730ee3842a872fe0d
-
Filesize
12KB
MD57f934338e10581d1b18a196474ac51e1
SHA14b28911a6ae3ef4e1502a184dd7044633ac7da4a
SHA256a9596721b74f4498b84feccbe92eb76194d48429f8fc4cef438a123a66a249bf
SHA512ab8fc0492ffdd13f30f83d6814e2cb43c56e812d9b978a4f47a6a8af9e02f57d4f43a72819e7181d9a709c86cfc63cb957de06f9d9f1eba730ee3842a872fe0d
-
Filesize
8KB
MD58c96dd6d4bbb740396025dbad40d5412
SHA12cf230b0a57707a5d05ed61f5a0b1efaacd6ef94
SHA256e805e5a4ca410a50388dafae97fa7a67dff55bd7435e29480252c8542dd01051
SHA5125585a305e56da595b02cde74cd2a41ada8d95468b4b28d80d97b58ce8465320fad5c09636585e37fe5afe036f7eee811fd778a3d320eabdaf2b0df69371b5fcf
-
Filesize
8KB
MD58c96dd6d4bbb740396025dbad40d5412
SHA12cf230b0a57707a5d05ed61f5a0b1efaacd6ef94
SHA256e805e5a4ca410a50388dafae97fa7a67dff55bd7435e29480252c8542dd01051
SHA5125585a305e56da595b02cde74cd2a41ada8d95468b4b28d80d97b58ce8465320fad5c09636585e37fe5afe036f7eee811fd778a3d320eabdaf2b0df69371b5fcf
-
Filesize
11KB
MD5ad6d3b758b0af522d1df51c83ebc9c2b
SHA164b50b3ead339767f9a58922bf092de14c87f8eb
SHA2565e055382c54af491b127340cb3346858b6acc1d3b58be4c93c74b638fe44e092
SHA5123d9d1c56606687b59c12fbe65cd69f785a8103691f4bd5fec15139fb9e6ef250987c24c46d43556cf88e8c3e3f3522d1039ce6ae7c99203cbe69baa1fc84c9ed