Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    257s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 20:44

General

  • Target

    e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll

  • Size

    946KB

  • MD5

    68cf656c0e8e869707725e5918cd2b94

  • SHA1

    be5be1c39411016e7ef2a1d1a7d0fec04f965af3

  • SHA256

    e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134

  • SHA512

    11b00eba0191f8e1b6b42c17efb56ec9da1859f4cca688f9433d7343b3a0e20e06177616d9c84215e89869316e8dcb7ff950b2d8ca525678c50c6962e89e15d5

  • SSDEEP

    24576:rp81j8Ey3dNOP7wv1APccrX2HaFQc7CAK5e865DtYZI6:uj8Ey3dgw9APccrX2HaFQc2/oDYZ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Kills process with taskkill 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:1496
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill -f -im iexplore.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:704
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill -f -im iexplore.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1680
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:1656
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill -f -im iexplore.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1516
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill -f -im iexplore.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1080
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1948
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v ygh /d "regsvr32 /s """C:\Users\Admin\AppData\Roaming\VDWSWJJD.jpg"""" /f
            4⤵
            • Adds Run key to start application
            PID:1776

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/940-55-0x0000000076201000-0x0000000076203000-memory.dmp

      Filesize

      8KB

    • memory/940-56-0x0000000000720000-0x0000000000811000-memory.dmp

      Filesize

      964KB