Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 02:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d.dll
Resource
win7-20230712-en
10 signatures
150 seconds
General
-
Target
d.dll
-
Size
527KB
-
MD5
60f8d1993043c054e0ddb91e11fc184f
-
SHA1
80d274ff4278baff08418d48c647c8c0604db3ab
-
SHA256
09a537a7c4bed33cfb33ae7d7b5360b52e6c1396a893b67b5e71acc28e3f74c2
-
SHA512
007d9ed82a9cb612882afa70f9482d078f7612e913fd6f4b351307b37c5eaaededaf5b1a2aa1ba0a2ebc48888a475b168b5ea2ad3ef1c35a883daf8ece9f795b
-
SSDEEP
12288:jymcE1WefvUdDpWcc/9scDp6MGuXxGSthFLEXCRF3MK:e6fvUdDp0/9sY6MGuFoCRF3MK
Malware Config
Extracted
Family
icedid
Campaign
43832328
C2
ospertoolsbo.com
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 472 rundll32.exe 472 rundll32.exe 472 rundll32.exe 472 rundll32.exe 472 rundll32.exe 472 rundll32.exe 1220 Process not Found 1220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 924 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 472 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe Token: SeShutdownPrivilege 924 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe 924 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2728 wrote to memory of 472 2728 cmd.exe 34 PID 2728 wrote to memory of 472 2728 cmd.exe 34 PID 2728 wrote to memory of 472 2728 cmd.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d.dll,#11⤵PID:2100
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2884
-
C:\Windows\system32\cmd.exe"cmd.exe" /s /k pushd "C:\Users\Admin\AppData\Local\Temp"1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\rundll32.exerundll32 d.dll, vcab /k chitos76852⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:472
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:924