Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 19:51
Behavioral task
behavioral1
Sample
0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll
Resource
win7-20231023-en
General
-
Target
0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll
-
Size
537KB
-
MD5
ada42bc98a05a0ffe6bc97cedc50197c
-
SHA1
3d1209bcddf2787e29d1fd354abfcbaf4ffeefc7
-
SHA256
0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209
-
SHA512
aa9619c23c1afe56a824fa980d6bf61ffb2bd1d962b6551a1569a79c1990a316df93af76700dbbcc37259ec8caeaa6f5309b19a6c32c47992efdd39f619b647c
-
SSDEEP
12288:8IHDE4QGEc9C6CBLKYOfH+OkfGhzlRYO0tHs3jiojajWv+Mb5:JjE4QGF46KLHOfeO+qctH+jdjPvRb5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/880-3-0x0000000010000000-0x0000000010182000-memory.dmp purplefox_rootkit behavioral1/memory/880-4-0x0000000000A50000-0x0000000000BED000-memory.dmp purplefox_rootkit behavioral1/memory/880-13-0x0000000010000000-0x0000000010182000-memory.dmp purplefox_rootkit behavioral1/memory/880-21-0x0000000010000000-0x0000000010182000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/memory/880-1-0x0000000010000000-0x0000000010182000-memory.dmp family_gh0strat behavioral1/memory/880-2-0x0000000010000000-0x0000000010182000-memory.dmp family_gh0strat behavioral1/memory/880-3-0x0000000010000000-0x0000000010182000-memory.dmp family_gh0strat behavioral1/memory/880-4-0x0000000000A50000-0x0000000000BED000-memory.dmp family_gh0strat behavioral1/memory/880-13-0x0000000010000000-0x0000000010182000-memory.dmp family_gh0strat behavioral1/memory/880-21-0x0000000010000000-0x0000000010182000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2652 Skcja.exe -
Loads dropped DLL 1 IoCs
pid Process 880 rundll32.exe -
resource yara_rule behavioral1/memory/880-0-0x0000000010000000-0x0000000010182000-memory.dmp upx behavioral1/memory/880-1-0x0000000010000000-0x0000000010182000-memory.dmp upx behavioral1/memory/880-2-0x0000000010000000-0x0000000010182000-memory.dmp upx behavioral1/memory/880-3-0x0000000010000000-0x0000000010182000-memory.dmp upx behavioral1/memory/880-13-0x0000000010000000-0x0000000010182000-memory.dmp upx behavioral1/memory/880-21-0x0000000010000000-0x0000000010182000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rundll32.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2604 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 880 rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2572 wrote to memory of 880 2572 rundll32.exe 28 PID 2572 wrote to memory of 880 2572 rundll32.exe 28 PID 2572 wrote to memory of 880 2572 rundll32.exe 28 PID 2572 wrote to memory of 880 2572 rundll32.exe 28 PID 2572 wrote to memory of 880 2572 rundll32.exe 28 PID 2572 wrote to memory of 880 2572 rundll32.exe 28 PID 2572 wrote to memory of 880 2572 rundll32.exe 28 PID 880 wrote to memory of 2652 880 rundll32.exe 31 PID 880 wrote to memory of 2652 880 rundll32.exe 31 PID 880 wrote to memory of 2652 880 rundll32.exe 31 PID 880 wrote to memory of 2652 880 rundll32.exe 31 PID 880 wrote to memory of 2520 880 rundll32.exe 32 PID 880 wrote to memory of 2520 880 rundll32.exe 32 PID 880 wrote to memory of 2520 880 rundll32.exe 32 PID 880 wrote to memory of 2520 880 rundll32.exe 32 PID 2520 wrote to memory of 2604 2520 cmd.exe 34 PID 2520 wrote to memory of 2604 2520 cmd.exe 34 PID 2520 wrote to memory of 2604 2520 cmd.exe 34 PID 2520 wrote to memory of 2604 2520 cmd.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Skcja.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Skcja.exe"3⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\SysWOW64\rundll32.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500.0MB
MD50abd9f0635dbab278a46b5264eef7087
SHA19bd4116fb9e559426147e60988d04dde9084829d
SHA25605bf8eec45788a60521eb4dcf90838a88ba0b91443a6afda27041e95e45363a3
SHA5124948c1e89116299059fa4d685cceb23a1d671b3af28133f37aacf6df4363a512f98d9544ef3cd2d712d3a3b0782529a85f82f185016f1d39b148b2e3aa4f65d9
-
Filesize
500.0MB
MD50abd9f0635dbab278a46b5264eef7087
SHA19bd4116fb9e559426147e60988d04dde9084829d
SHA25605bf8eec45788a60521eb4dcf90838a88ba0b91443a6afda27041e95e45363a3
SHA5124948c1e89116299059fa4d685cceb23a1d671b3af28133f37aacf6df4363a512f98d9544ef3cd2d712d3a3b0782529a85f82f185016f1d39b148b2e3aa4f65d9
-
Filesize
500.0MB
MD50abd9f0635dbab278a46b5264eef7087
SHA19bd4116fb9e559426147e60988d04dde9084829d
SHA25605bf8eec45788a60521eb4dcf90838a88ba0b91443a6afda27041e95e45363a3
SHA5124948c1e89116299059fa4d685cceb23a1d671b3af28133f37aacf6df4363a512f98d9544ef3cd2d712d3a3b0782529a85f82f185016f1d39b148b2e3aa4f65d9