Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244.dll
Resource
win10v2004-20230220-en
General
-
Target
4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244.dll
-
Size
453KB
-
MD5
56018500f73e3f6cf179d3b853c27912
-
SHA1
a3060a3efb9ac3da444ef8abc99143293076fe32
-
SHA256
4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244
-
SHA512
730586717c13d19c4141ce1b44a6e91bcfe4deac8c99eb438d452c965c0b5adac4b2b68da04ad6abc6900bcc410d1801e448831903a8265f3b370896434d8f8e
-
SSDEEP
12288:BJWFxerI6z4GrTyPy2ROqz/sC670ahgA6:BJWuIE4Gr2PX5UCs0a
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 2656 rundll32.exe 7 2656 rundll32.exe 35 2656 rundll32.exe 43 2656 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive Update = "C:\\\\Windows\\\\System32\\\\rundll32.exe C:\\\\ProgramData\\\\VMware\\\\vmnat-update.bin,OCSP_resp_find lxUi5CZ0IV45j89Y 4901" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1224 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2656 1224 rundll32.exe 83 PID 1224 wrote to memory of 2656 1224 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c3499f3cc4a4fdc7e67417e055891c78540282dccc57e37a01167dfe351b244.dll,CMS_dataFinal Bx9yb37GEcJNK6bt 49011⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\System32\rundll32.exeC:\\Windows\\System32\\rundll32.exe C:\\ProgramData\\VMware\\vmnat-update.bin,OCSP_resp_find lxUi5CZ0IV45j89Y 49012⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5f5475608c0126582081e29927424f338
SHA18e88fd82378794a17a4211fbf2ee2506b9636b02
SHA256a75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855
SHA512b47eb6b6d22ce249a8661daf576af2fcc4d5eeae78a48ff1fda4bc4816b7b4d12c40211b716cec372f7b7b5bd4878efa1a9cf7e54dbbf6cb878065abb0d4e05a
-
Filesize
512KB
MD5f5475608c0126582081e29927424f338
SHA18e88fd82378794a17a4211fbf2ee2506b9636b02
SHA256a75886b016d84c3eaacaf01a3c61e04953a7a3adf38acf77a4a2e3a8f544f855
SHA512b47eb6b6d22ce249a8661daf576af2fcc4d5eeae78a48ff1fda4bc4816b7b4d12c40211b716cec372f7b7b5bd4878efa1a9cf7e54dbbf6cb878065abb0d4e05a