Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
b4b0b78f5da65d78fdb1187baf209855.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b4b0b78f5da65d78fdb1187baf209855.dll
Resource
win10v2004-20231215-en
General
-
Target
b4b0b78f5da65d78fdb1187baf209855.dll
-
Size
2.5MB
-
MD5
b4b0b78f5da65d78fdb1187baf209855
-
SHA1
ad1bdca57e8725abe36e505afdeb97c772d8e212
-
SHA256
7f709a833b58c4401cfbdc000fa34a876c50b64c3f890a3c173f0204db0facff
-
SHA512
3e01817ef0ef6c11e5f479b56dde7cd27bbd52cc17c13e61da9d935f514117e1b265e5db3c129c719488e3408b6d79c8861cdee6f5294cdf9bdfae7cdc8120c6
-
SSDEEP
24576:L2A3h2k21FoIhQ6JgHBZgEl4HE82FwLh5DM/++5v5DyhFVCaRCR27il+aj:6hNnkZgnHaFEh5Dqj5v5uhFVCA++aj
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2384 rundll32.exe 7 2384 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 f776104.exe -
Loads dropped DLL 9 IoCs
pid Process 2384 rundll32.exe 2384 rundll32.exe 2384 rundll32.exe 2384 rundll32.exe 2132 WerFault.exe 2132 WerFault.exe 2132 WerFault.exe 2132 WerFault.exe 2132 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2132 2836 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2384 2536 rundll32.exe 28 PID 2536 wrote to memory of 2384 2536 rundll32.exe 28 PID 2536 wrote to memory of 2384 2536 rundll32.exe 28 PID 2536 wrote to memory of 2384 2536 rundll32.exe 28 PID 2536 wrote to memory of 2384 2536 rundll32.exe 28 PID 2536 wrote to memory of 2384 2536 rundll32.exe 28 PID 2536 wrote to memory of 2384 2536 rundll32.exe 28 PID 2384 wrote to memory of 2836 2384 rundll32.exe 33 PID 2384 wrote to memory of 2836 2384 rundll32.exe 33 PID 2384 wrote to memory of 2836 2384 rundll32.exe 33 PID 2384 wrote to memory of 2836 2384 rundll32.exe 33 PID 2836 wrote to memory of 2132 2836 f776104.exe 34 PID 2836 wrote to memory of 2132 2836 f776104.exe 34 PID 2836 wrote to memory of 2132 2836 f776104.exe 34 PID 2836 wrote to memory of 2132 2836 f776104.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4b0b78f5da65d78fdb1187baf209855.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4b0b78f5da65d78fdb1187baf209855.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\f776104.exe"C:\Users\Admin\AppData\Local\Temp\f776104.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 5324⤵
- Loads dropped DLL
- Program crash
PID:2132
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5858939a54a0406e5be7220b92b6eb2b3
SHA1da24c0b6f723a74a8ec59e58c9c0aea3e86b7109
SHA256a30f30a109cb78d5eb1969f6c13f01a1e0a5f07b7ad8b133f5d2616223c1ce0a
SHA5128875d1e43ea59314695747796894a2f171e92f7b04024dbc529af1497331489e279cd06ea03061288089d2f07ad437178b9d62f0bae2e16ae0b95c5681569401