Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
b4b0b78f5da65d78fdb1187baf209855.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b4b0b78f5da65d78fdb1187baf209855.dll
Resource
win10v2004-20231215-en
General
-
Target
b4b0b78f5da65d78fdb1187baf209855.dll
-
Size
2.5MB
-
MD5
b4b0b78f5da65d78fdb1187baf209855
-
SHA1
ad1bdca57e8725abe36e505afdeb97c772d8e212
-
SHA256
7f709a833b58c4401cfbdc000fa34a876c50b64c3f890a3c173f0204db0facff
-
SHA512
3e01817ef0ef6c11e5f479b56dde7cd27bbd52cc17c13e61da9d935f514117e1b265e5db3c129c719488e3408b6d79c8861cdee6f5294cdf9bdfae7cdc8120c6
-
SSDEEP
24576:L2A3h2k21FoIhQ6JgHBZgEl4HE82FwLh5DM/++5v5DyhFVCaRCR27il+aj:6hNnkZgnHaFEh5Dqj5v5uhFVCA++aj
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 50 3556 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 4356 e584d60.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1056 4356 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4596 wrote to memory of 3556 4596 rundll32.exe 90 PID 4596 wrote to memory of 3556 4596 rundll32.exe 90 PID 4596 wrote to memory of 3556 4596 rundll32.exe 90 PID 3556 wrote to memory of 4356 3556 rundll32.exe 100 PID 3556 wrote to memory of 4356 3556 rundll32.exe 100 PID 3556 wrote to memory of 4356 3556 rundll32.exe 100
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4b0b78f5da65d78fdb1187baf209855.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4b0b78f5da65d78fdb1187baf209855.dll,#12⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\e584d60.exe"C:\Users\Admin\AppData\Local\Temp\e584d60.exe"3⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 8044⤵
- Program crash
PID:1056
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4356 -ip 43561⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5858939a54a0406e5be7220b92b6eb2b3
SHA1da24c0b6f723a74a8ec59e58c9c0aea3e86b7109
SHA256a30f30a109cb78d5eb1969f6c13f01a1e0a5f07b7ad8b133f5d2616223c1ce0a
SHA5128875d1e43ea59314695747796894a2f171e92f7b04024dbc529af1497331489e279cd06ea03061288089d2f07ad437178b9d62f0bae2e16ae0b95c5681569401