Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:16 UTC
Static task
static1
Behavioral task
behavioral1
Sample
bcd53a03a12a4ce08e833fdcdd8d8cca.dll
Resource
win7-20231215-en
General
-
Target
bcd53a03a12a4ce08e833fdcdd8d8cca.dll
-
Size
2.0MB
-
MD5
bcd53a03a12a4ce08e833fdcdd8d8cca
-
SHA1
0e84a0c65f7eb5273609ec94a4de8217995726db
-
SHA256
610801e1516dac10986662e4aa33209c5699069c84322ac8abdcd548a8eb3ea0
-
SHA512
729335e687444f306acea30cb14569247b3ffda79d935a08163a5d0fc92d2268fa0023249c10789833b4f2202e8c7832617256c9c362585a8bb4afaeee3c6788
-
SSDEEP
12288:lVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:8fP7fWsK5z9A+WGAW+V5SB6Ct4bnb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-5-0x0000000002A00000-0x0000000002A01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2608 SystemPropertiesProtection.exe 472 notepad.exe 2848 SystemPropertiesPerformance.exe -
Loads dropped DLL 7 IoCs
pid Process 1204 Process not Found 2608 SystemPropertiesProtection.exe 1204 Process not Found 472 notepad.exe 1204 Process not Found 2848 SystemPropertiesPerformance.exe 1204 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fskzoiv = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IOAy7UQ\\notepad.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesProtection.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 616 rundll32.exe 616 rundll32.exe 616 rundll32.exe 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2588 1204 Process not Found 28 PID 1204 wrote to memory of 2588 1204 Process not Found 28 PID 1204 wrote to memory of 2588 1204 Process not Found 28 PID 1204 wrote to memory of 2608 1204 Process not Found 29 PID 1204 wrote to memory of 2608 1204 Process not Found 29 PID 1204 wrote to memory of 2608 1204 Process not Found 29 PID 1204 wrote to memory of 524 1204 Process not Found 30 PID 1204 wrote to memory of 524 1204 Process not Found 30 PID 1204 wrote to memory of 524 1204 Process not Found 30 PID 1204 wrote to memory of 472 1204 Process not Found 31 PID 1204 wrote to memory of 472 1204 Process not Found 31 PID 1204 wrote to memory of 472 1204 Process not Found 31 PID 1204 wrote to memory of 604 1204 Process not Found 32 PID 1204 wrote to memory of 604 1204 Process not Found 32 PID 1204 wrote to memory of 604 1204 Process not Found 32 PID 1204 wrote to memory of 2848 1204 Process not Found 33 PID 1204 wrote to memory of 2848 1204 Process not Found 33 PID 1204 wrote to memory of 2848 1204 Process not Found 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcd53a03a12a4ce08e833fdcdd8d8cca.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:616
-
C:\Windows\system32\SystemPropertiesProtection.exeC:\Windows\system32\SystemPropertiesProtection.exe1⤵PID:2588
-
C:\Users\Admin\AppData\Local\TZOn\SystemPropertiesProtection.exeC:\Users\Admin\AppData\Local\TZOn\SystemPropertiesProtection.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2608
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵PID:524
-
C:\Users\Admin\AppData\Local\9TO\notepad.exeC:\Users\Admin\AppData\Local\9TO\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:472
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:604
-
C:\Users\Admin\AppData\Local\CQp8YVLa\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\CQp8YVLa\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD5f6df262b8e4f3c3e7e49b82f5b76fa1c
SHA1566351d0f2f29afaa264ebc0e4ac4af805c05041
SHA256e719ac4680dac410537ea95b96ee3bc25081958b846c51d55797117ca0bb0735
SHA5129ff6063b1642bbb00e6e3e93960c4b16834dceb2fb2dc56f29c51bd834031927919f3d6960c992e8eba1b6de44fbb14ecc6188fc47af8869846dd5f27cc41c8c
-
Filesize
45KB
MD57e13131ecfad454128b12555a7fd0020
SHA15d7ef1f3f91912eb83d296c2543519efcc28f9e7
SHA2561d2c480bebbe3e61a1e16b963f7cc691d49133f9f8f963ad2cc3c3dc082ca83d
SHA512dff9bfefb67ced5bfb8ddddf15928c74463a446bf48c10c95f62e8d33d128040be42ea02a0f86ce055ed24c10082e9c5d414468f7f5da0fe95a7c5b43b6d2078
-
Filesize
316KB
MD53904b2677d8d39bf48515c911647cf34
SHA138625585fe851be72ab5ef91a34ae1d414c793e0
SHA2567091e8be3c94c74e352dea7e78e44fa8c70dab0afef8e341e6d979718e6b6c44
SHA5127645d983a0dc4739d6eaa15f877a94b195f7f56bd9163546b035089b57b286b14abd3d0c0ef8a3981a5f97fbcb02ba20518e7d36fb1e5ab8d4a184a113fd40c3
-
Filesize
80KB
MD5870726cdcc241a92785572628b89cc07
SHA163d47cc4fe9beb75862add1abca1d8ae8235710a
SHA2561ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6
SHA51289b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72
-
Filesize
77KB
MD5b4d54088d30e59a692c60d00a9c101ba
SHA1b857004724bc1a50a9df139fa05655100e1cb3a3
SHA256a9dfd85b19d45cec3ea5d00d2dc52e30563e8b49b9a767dfc4cd712d3533e8c5
SHA51225eb309db0ee53c9ef2143b615b660387aa003e43bc4aa26c718a573b0ad5684dc7df0933f250b9856b19a1439297703a73f7259b6d500195bf14c0901e5d97b
-
Filesize
80KB
MD505138d8f952d3fff1362f7c50158bc38
SHA1780bc59fcddf06a7494d09771b8340acffdcc720
SHA256753a43d8aa74341d06582bd6b3784dc5f8c6f46174c2a306cf284de238a9c6bd
SHA51227fa8c0af3d01f0816852d04693087f3c25d1307d8857a7ea75b0bb3e0ac927d262f5ac5a335afee150142fa3187354d33ebbcf6c3cd5cc33cb4e6cd00c50255
-
Filesize
1KB
MD5b43bbe82878099a186f3913d609d7671
SHA1a8d4af4735ff68bce88c2737cf17eee4dabbf4a5
SHA25685c0a3fda502686d418e12ab485d3ea7939bf87ca2c450a84dfad44f3ee5abe7
SHA512c0b32fb735440acdd224b3d0b7c865cf92836d8e14c7cd7c8fba3ef1c59fdbb91e9d97242d308f9a51a20ffcdeda76808e7738f97ead8fc4ce2a60867984e008
-
Filesize
2.0MB
MD5027cb7dff72b55cbe67f340c27955253
SHA1e875e8b20ba335af05406808a8cff65a3306d71f
SHA2567112bba281aef2f345670d7daa9125d11fe0538645421c04001125119524e500
SHA512a4d9b4dbb3ddf72d0cc8ea78cb25d5d48d715ef29374c978ee014c4b68587ff41245f56d6f4931dca491c8eebfe5de81995e5e5ada69b21dcce48edf93ba87b7
-
Filesize
2.0MB
MD527c9a97238f378fa8c0014ebb5d0da46
SHA18ee335e4e240d79ba7d053f12296d25531494d16
SHA2569d2927a8e0886fde0b6c3d4df8e0677f06701dc9185421c0c8cb07d546bb104c
SHA512860e7ca6d533124984b782fe5eab1325cc71a3e2af19c5be0837484d6b48af5e4bc1218a582288583af5d31114acff9f985583c6ba0c04d89e0de157a3adfe26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\Low\KttqBvA\SystemPropertiesPerformance.exe
Filesize28KB
MD5d1d7abadb9010789e1f8c69b715d318e
SHA1ca07f527ad68010a974e7c5f9e0f5a1728cf2c47
SHA256367c9e5b775b4004d4b570721293128d90926c62d682419df400f1f19497237b
SHA512e749568b86e8b680afdebff68a14da1bd579d871b740a83de782b27e50133c2c6de0944c33690d81dad8874a23913ffc5f24c5d007d50c4c168120c0bdd101d6
-
Filesize
2.0MB
MD577af567071d675e7791301166ea130e7
SHA18ebbcd00e1e3dcbc9db33879633f704fb2c565ae
SHA2569b44bc5aba7387e93a5fb2f114f8837d68ff875d32aec37f4187f9d26786674b
SHA51280154ecd712c68176fb11aefca51152267b48b05399c2fde8496ca73ed6a6dcf5db8ae74161fd69ed0908c49c1a048cd50fe753ce04e86db368ec73d8a411718
-
Filesize
210KB
MD5daaeaa4ab023e6fad024e9239e3dd0d3
SHA15d27726e6c8a7d3209122a18308c844146f14c36
SHA256f0498f38d9b2d092bfda05a07f7d534772909881ecf74e07f976795aef2413f5
SHA512cc7d8e8940be5dc8153427383a3c51af91c8d58ad6a06adf418da932ac96bc6067e4545c06a130227b19a2be56b8c5618aabe28288b18fde72591efff7120ffc
-
Filesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
Filesize
268KB
MD516bb8b59b41c6a4d2f9a88aacf1dfad6
SHA1ce57e2c66aeab7a66b7866d047f256c904e67b3e
SHA2562ea50da55ec87b94db67441fa1b2e011f9f05ea45bd000416b1a9d8ba83d7abf
SHA512444c8efb83117bb3457787dc1cd0f52e75956a2bff73bf9057874d6ebfc05d8e6aba9b506054d3c7683893de4d0b391afe740c2fab469ef1fb782b493b694902
-
Filesize
114KB
MD5c07226e6d35055b3ad928805e60fed39
SHA1e5fc091f0e152058cff1e056327072289b0e0b55
SHA256bae66952feacdaf2ce7b9829ffc4edbaa8b1501652f1ed889b72620499f34a97
SHA51258ad5c6b276de49373f862209158876174a39d50ef8de007c73dbdd5784b471518ca915ca86accaae088d79f2b31f9b5b58dc3176c50fd83027715875902ebe1
-
Filesize
45KB
MD59e67f5450d6dd4a41449caa6fc7c6c59
SHA1079d7611d171c16f92f263f33a3f7c13b98a2deb
SHA2560994fa2c50743864c186572fb539cb36ae0224f299af6f74b0238dccdd4ca76f
SHA5124d51acd88b5617a685ec16f9e5b5a5197cdd72930e199d813b24c58902f02de9ff50bb3b3fea467f2ef707e1cffcba0d48c0d05858cba8515fccf91aafec7370
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\Low\KttqBvA\SystemPropertiesPerformance.exe
Filesize42KB
MD5e016ebf74e99c3d91dbfb31994ce6846
SHA1be4e18b420ca9f87a36394b99af34b9aa457b8b5
SHA256340ceef8c2d469e5ceb04dcb86bfda6bf9332430a18ee58de4d81b329435cf18
SHA512600b83269e3931aceb58417c1bf44514e0a7e4016e537191823c17eb9cb6db408c287882371cb0b601bb35fb2bf0b6ffbd86e88f49457b4bcdc7e3e6a7cd8681