Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
257s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll
Resource
win10v2004-20220812-en
General
-
Target
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll
-
Size
946KB
-
MD5
68cf656c0e8e869707725e5918cd2b94
-
SHA1
be5be1c39411016e7ef2a1d1a7d0fec04f965af3
-
SHA256
e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134
-
SHA512
11b00eba0191f8e1b6b42c17efb56ec9da1859f4cca688f9433d7343b3a0e20e06177616d9c84215e89869316e8dcb7ff950b2d8ca525678c50c6962e89e15d5
-
SSDEEP
24576:rp81j8Ey3dNOP7wv1APccrX2HaFQc7CAK5e865DtYZI6:uj8Ey3dgw9APccrX2HaFQc2/oDYZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ygh = "regsvr32 /s \"C:\\Users\\Admin\\AppData\\Roaming\\VDWSWJJD.jpg\"" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 940 set thread context of 1656 940 rundll32.exe 34 PID 940 set thread context of 1948 940 rundll32.exe 39 -
Kills process with taskkill 4 IoCs
pid Process 704 taskkill.exe 1680 taskkill.exe 1516 taskkill.exe 1080 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1680 taskkill.exe Token: SeDebugPrivilege 704 taskkill.exe Token: SeDebugPrivilege 1080 taskkill.exe Token: SeDebugPrivilege 1516 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1656 iexplore.exe 1948 iexplore.exe 1948 iexplore.exe 1948 iexplore.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 320 wrote to memory of 940 320 rundll32.exe 27 PID 320 wrote to memory of 940 320 rundll32.exe 27 PID 320 wrote to memory of 940 320 rundll32.exe 27 PID 320 wrote to memory of 940 320 rundll32.exe 27 PID 320 wrote to memory of 940 320 rundll32.exe 27 PID 320 wrote to memory of 940 320 rundll32.exe 27 PID 320 wrote to memory of 940 320 rundll32.exe 27 PID 940 wrote to memory of 1496 940 rundll32.exe 28 PID 940 wrote to memory of 1496 940 rundll32.exe 28 PID 940 wrote to memory of 1496 940 rundll32.exe 28 PID 940 wrote to memory of 1496 940 rundll32.exe 28 PID 940 wrote to memory of 704 940 rundll32.exe 29 PID 940 wrote to memory of 704 940 rundll32.exe 29 PID 940 wrote to memory of 704 940 rundll32.exe 29 PID 940 wrote to memory of 704 940 rundll32.exe 29 PID 940 wrote to memory of 1680 940 rundll32.exe 30 PID 940 wrote to memory of 1680 940 rundll32.exe 30 PID 940 wrote to memory of 1680 940 rundll32.exe 30 PID 940 wrote to memory of 1680 940 rundll32.exe 30 PID 940 wrote to memory of 1656 940 rundll32.exe 34 PID 940 wrote to memory of 1656 940 rundll32.exe 34 PID 940 wrote to memory of 1656 940 rundll32.exe 34 PID 940 wrote to memory of 1656 940 rundll32.exe 34 PID 940 wrote to memory of 1656 940 rundll32.exe 34 PID 940 wrote to memory of 1656 940 rundll32.exe 34 PID 940 wrote to memory of 1516 940 rundll32.exe 35 PID 940 wrote to memory of 1516 940 rundll32.exe 35 PID 940 wrote to memory of 1516 940 rundll32.exe 35 PID 940 wrote to memory of 1516 940 rundll32.exe 35 PID 940 wrote to memory of 1080 940 rundll32.exe 37 PID 940 wrote to memory of 1080 940 rundll32.exe 37 PID 940 wrote to memory of 1080 940 rundll32.exe 37 PID 940 wrote to memory of 1080 940 rundll32.exe 37 PID 940 wrote to memory of 1948 940 rundll32.exe 39 PID 940 wrote to memory of 1948 940 rundll32.exe 39 PID 940 wrote to memory of 1948 940 rundll32.exe 39 PID 940 wrote to memory of 1948 940 rundll32.exe 39 PID 940 wrote to memory of 1948 940 rundll32.exe 39 PID 940 wrote to memory of 1948 940 rundll32.exe 39 PID 1948 wrote to memory of 1776 1948 iexplore.exe 40 PID 1948 wrote to memory of 1776 1948 iexplore.exe 40 PID 1948 wrote to memory of 1776 1948 iexplore.exe 40 PID 1948 wrote to memory of 1776 1948 iexplore.exe 40
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im iexplore.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im iexplore.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im iexplore.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im iexplore.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v ygh /d "regsvr32 /s """C:\Users\Admin\AppData\Roaming\VDWSWJJD.jpg"""" /f4⤵
- Adds Run key to start application
PID:1776
-
-
-