Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
d305da0f4ca8d0675218747ec7f6dd2357b4a4187627f40fdafca23d90e5d232.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d305da0f4ca8d0675218747ec7f6dd2357b4a4187627f40fdafca23d90e5d232.dll
Resource
win10v2004-20220901-en
General
-
Target
d305da0f4ca8d0675218747ec7f6dd2357b4a4187627f40fdafca23d90e5d232.dll
-
Size
26KB
-
MD5
926ecb7f90014b663b7cff31b689517d
-
SHA1
943262a40dea888a3e635dad1a0977782578be46
-
SHA256
d305da0f4ca8d0675218747ec7f6dd2357b4a4187627f40fdafca23d90e5d232
-
SHA512
1d33e2c0119ebeb8a737c2ca86b209ed85b333b76d125e03b461c7f85d48fa459f193ffbb944b0b20961a33d1270a22a533e0ec3343e24a9ff4c3a0c6a2fed9f
-
SSDEEP
384:GhDR3tFHvfJIVNkVgJ6xzB6vh1vq2TxD99eYXzLFx+WHWyW4BbffTkGsVD35kVDp:GhJtf3S6xzqhlq2n97toBQpIS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe rundll32.exe oife.mro printer" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\oife.mro rundll32.exe File opened for modification C:\Windows\SysWOW64\oife.mro rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1796 2496 WerFault.exe 87 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4372 WINWORD.EXE 4372 WINWORD.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5004 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4372 WINWORD.EXE 4372 WINWORD.EXE 4372 WINWORD.EXE 4372 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4972 wrote to memory of 5004 4972 rundll32.exe 81 PID 4972 wrote to memory of 5004 4972 rundll32.exe 81 PID 4972 wrote to memory of 5004 4972 rundll32.exe 81 PID 5004 wrote to memory of 2496 5004 rundll32.exe 87 PID 5004 wrote to memory of 2496 5004 rundll32.exe 87 PID 5004 wrote to memory of 2496 5004 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d305da0f4ca8d0675218747ec7f6dd2357b4a4187627f40fdafca23d90e5d232.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d305da0f4ca8d0675218747ec7f6dd2357b4a4187627f40fdafca23d90e5d232.dll,#12⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 2004⤵
- Program crash
PID:1796
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2496 -ip 24961⤵PID:4044