Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 14:16 UTC

General

  • Target

    bcd53a03a12a4ce08e833fdcdd8d8cca.dll

  • Size

    2.0MB

  • MD5

    bcd53a03a12a4ce08e833fdcdd8d8cca

  • SHA1

    0e84a0c65f7eb5273609ec94a4de8217995726db

  • SHA256

    610801e1516dac10986662e4aa33209c5699069c84322ac8abdcd548a8eb3ea0

  • SHA512

    729335e687444f306acea30cb14569247b3ffda79d935a08163a5d0fc92d2268fa0023249c10789833b4f2202e8c7832617256c9c362585a8bb4afaeee3c6788

  • SSDEEP

    12288:lVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:8fP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bcd53a03a12a4ce08e833fdcdd8d8cca.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:616
  • C:\Windows\system32\SystemPropertiesProtection.exe
    C:\Windows\system32\SystemPropertiesProtection.exe
    1⤵
      PID:2588
    • C:\Users\Admin\AppData\Local\TZOn\SystemPropertiesProtection.exe
      C:\Users\Admin\AppData\Local\TZOn\SystemPropertiesProtection.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2608
    • C:\Windows\system32\notepad.exe
      C:\Windows\system32\notepad.exe
      1⤵
        PID:524
      • C:\Users\Admin\AppData\Local\9TO\notepad.exe
        C:\Users\Admin\AppData\Local\9TO\notepad.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:472
      • C:\Windows\system32\SystemPropertiesPerformance.exe
        C:\Windows\system32\SystemPropertiesPerformance.exe
        1⤵
          PID:604
        • C:\Users\Admin\AppData\Local\CQp8YVLa\SystemPropertiesPerformance.exe
          C:\Users\Admin\AppData\Local\CQp8YVLa\SystemPropertiesPerformance.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2848

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\9TO\VERSION.dll

          Filesize

          241KB

          MD5

          f6df262b8e4f3c3e7e49b82f5b76fa1c

          SHA1

          566351d0f2f29afaa264ebc0e4ac4af805c05041

          SHA256

          e719ac4680dac410537ea95b96ee3bc25081958b846c51d55797117ca0bb0735

          SHA512

          9ff6063b1642bbb00e6e3e93960c4b16834dceb2fb2dc56f29c51bd834031927919f3d6960c992e8eba1b6de44fbb14ecc6188fc47af8869846dd5f27cc41c8c

        • C:\Users\Admin\AppData\Local\9TO\notepad.exe

          Filesize

          45KB

          MD5

          7e13131ecfad454128b12555a7fd0020

          SHA1

          5d7ef1f3f91912eb83d296c2543519efcc28f9e7

          SHA256

          1d2c480bebbe3e61a1e16b963f7cc691d49133f9f8f963ad2cc3c3dc082ca83d

          SHA512

          dff9bfefb67ced5bfb8ddddf15928c74463a446bf48c10c95f62e8d33d128040be42ea02a0f86ce055ed24c10082e9c5d414468f7f5da0fe95a7c5b43b6d2078

        • C:\Users\Admin\AppData\Local\CQp8YVLa\SYSDM.CPL

          Filesize

          316KB

          MD5

          3904b2677d8d39bf48515c911647cf34

          SHA1

          38625585fe851be72ab5ef91a34ae1d414c793e0

          SHA256

          7091e8be3c94c74e352dea7e78e44fa8c70dab0afef8e341e6d979718e6b6c44

          SHA512

          7645d983a0dc4739d6eaa15f877a94b195f7f56bd9163546b035089b57b286b14abd3d0c0ef8a3981a5f97fbcb02ba20518e7d36fb1e5ab8d4a184a113fd40c3

        • C:\Users\Admin\AppData\Local\CQp8YVLa\SystemPropertiesPerformance.exe

          Filesize

          80KB

          MD5

          870726cdcc241a92785572628b89cc07

          SHA1

          63d47cc4fe9beb75862add1abca1d8ae8235710a

          SHA256

          1ab77fa1ee0cbe59ca185c228c3c11abeba2b2008a162c91a06d3c40542e7fc6

          SHA512

          89b961c2a2716fe0800e54e0206c8b349a26f1bc2a463ec9bd12f3ab22bfcb13e6402b4c20ddcf284d838a3c66e73335af8f6dc4554d76646382e387242c6f72

        • C:\Users\Admin\AppData\Local\TZOn\SYSDM.CPL

          Filesize

          77KB

          MD5

          b4d54088d30e59a692c60d00a9c101ba

          SHA1

          b857004724bc1a50a9df139fa05655100e1cb3a3

          SHA256

          a9dfd85b19d45cec3ea5d00d2dc52e30563e8b49b9a767dfc4cd712d3533e8c5

          SHA512

          25eb309db0ee53c9ef2143b615b660387aa003e43bc4aa26c718a573b0ad5684dc7df0933f250b9856b19a1439297703a73f7259b6d500195bf14c0901e5d97b

        • C:\Users\Admin\AppData\Local\TZOn\SystemPropertiesProtection.exe

          Filesize

          80KB

          MD5

          05138d8f952d3fff1362f7c50158bc38

          SHA1

          780bc59fcddf06a7494d09771b8340acffdcc720

          SHA256

          753a43d8aa74341d06582bd6b3784dc5f8c6f46174c2a306cf284de238a9c6bd

          SHA512

          27fa8c0af3d01f0816852d04693087f3c25d1307d8857a7ea75b0bb3e0ac927d262f5ac5a335afee150142fa3187354d33ebbcf6c3cd5cc33cb4e6cd00c50255

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Zrkibbhbsqvuoso.lnk

          Filesize

          1KB

          MD5

          b43bbe82878099a186f3913d609d7671

          SHA1

          a8d4af4735ff68bce88c2737cf17eee4dabbf4a5

          SHA256

          85c0a3fda502686d418e12ab485d3ea7939bf87ca2c450a84dfad44f3ee5abe7

          SHA512

          c0b32fb735440acdd224b3d0b7c865cf92836d8e14c7cd7c8fba3ef1c59fdbb91e9d97242d308f9a51a20ffcdeda76808e7738f97ead8fc4ce2a60867984e008

        • C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\iuXw6wZSLT\SYSDM.CPL

          Filesize

          2.0MB

          MD5

          027cb7dff72b55cbe67f340c27955253

          SHA1

          e875e8b20ba335af05406808a8cff65a3306d71f

          SHA256

          7112bba281aef2f345670d7daa9125d11fe0538645421c04001125119524e500

          SHA512

          a4d9b4dbb3ddf72d0cc8ea78cb25d5d48d715ef29374c978ee014c4b68587ff41245f56d6f4931dca491c8eebfe5de81995e5e5ada69b21dcce48edf93ba87b7

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\Low\KttqBvA\SYSDM.CPL

          Filesize

          2.0MB

          MD5

          27c9a97238f378fa8c0014ebb5d0da46

          SHA1

          8ee335e4e240d79ba7d053f12296d25531494d16

          SHA256

          9d2927a8e0886fde0b6c3d4df8e0677f06701dc9185421c0c8cb07d546bb104c

          SHA512

          860e7ca6d533124984b782fe5eab1325cc71a3e2af19c5be0837484d6b48af5e4bc1218a582288583af5d31114acff9f985583c6ba0c04d89e0de157a3adfe26

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\Low\KttqBvA\SystemPropertiesPerformance.exe

          Filesize

          28KB

          MD5

          d1d7abadb9010789e1f8c69b715d318e

          SHA1

          ca07f527ad68010a974e7c5f9e0f5a1728cf2c47

          SHA256

          367c9e5b775b4004d4b570721293128d90926c62d682419df400f1f19497237b

          SHA512

          e749568b86e8b680afdebff68a14da1bd579d871b740a83de782b27e50133c2c6de0944c33690d81dad8874a23913ffc5f24c5d007d50c4c168120c0bdd101d6

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IOAy7UQ\VERSION.dll

          Filesize

          2.0MB

          MD5

          77af567071d675e7791301166ea130e7

          SHA1

          8ebbcd00e1e3dcbc9db33879633f704fb2c565ae

          SHA256

          9b44bc5aba7387e93a5fb2f114f8837d68ff875d32aec37f4187f9d26786674b

          SHA512

          80154ecd712c68176fb11aefca51152267b48b05399c2fde8496ca73ed6a6dcf5db8ae74161fd69ed0908c49c1a048cd50fe753ce04e86db368ec73d8a411718

        • \Users\Admin\AppData\Local\9TO\VERSION.dll

          Filesize

          210KB

          MD5

          daaeaa4ab023e6fad024e9239e3dd0d3

          SHA1

          5d27726e6c8a7d3209122a18308c844146f14c36

          SHA256

          f0498f38d9b2d092bfda05a07f7d534772909881ecf74e07f976795aef2413f5

          SHA512

          cc7d8e8940be5dc8153427383a3c51af91c8d58ad6a06adf418da932ac96bc6067e4545c06a130227b19a2be56b8c5618aabe28288b18fde72591efff7120ffc

        • \Users\Admin\AppData\Local\9TO\notepad.exe

          Filesize

          189KB

          MD5

          f2c7bb8acc97f92e987a2d4087d021b1

          SHA1

          7eb0139d2175739b3ccb0d1110067820be6abd29

          SHA256

          142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2

          SHA512

          2f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8

        • \Users\Admin\AppData\Local\CQp8YVLa\SYSDM.CPL

          Filesize

          268KB

          MD5

          16bb8b59b41c6a4d2f9a88aacf1dfad6

          SHA1

          ce57e2c66aeab7a66b7866d047f256c904e67b3e

          SHA256

          2ea50da55ec87b94db67441fa1b2e011f9f05ea45bd000416b1a9d8ba83d7abf

          SHA512

          444c8efb83117bb3457787dc1cd0f52e75956a2bff73bf9057874d6ebfc05d8e6aba9b506054d3c7683893de4d0b391afe740c2fab469ef1fb782b493b694902

        • \Users\Admin\AppData\Local\TZOn\SYSDM.CPL

          Filesize

          114KB

          MD5

          c07226e6d35055b3ad928805e60fed39

          SHA1

          e5fc091f0e152058cff1e056327072289b0e0b55

          SHA256

          bae66952feacdaf2ce7b9829ffc4edbaa8b1501652f1ed889b72620499f34a97

          SHA512

          58ad5c6b276de49373f862209158876174a39d50ef8de007c73dbdd5784b471518ca915ca86accaae088d79f2b31f9b5b58dc3176c50fd83027715875902ebe1

        • \Users\Admin\AppData\Local\TZOn\SystemPropertiesProtection.exe

          Filesize

          45KB

          MD5

          9e67f5450d6dd4a41449caa6fc7c6c59

          SHA1

          079d7611d171c16f92f263f33a3f7c13b98a2deb

          SHA256

          0994fa2c50743864c186572fb539cb36ae0224f299af6f74b0238dccdd4ca76f

          SHA512

          4d51acd88b5617a685ec16f9e5b5a5197cdd72930e199d813b24c58902f02de9ff50bb3b3fea467f2ef707e1cffcba0d48c0d05858cba8515fccf91aafec7370

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\Low\KttqBvA\SystemPropertiesPerformance.exe

          Filesize

          42KB

          MD5

          e016ebf74e99c3d91dbfb31994ce6846

          SHA1

          be4e18b420ca9f87a36394b99af34b9aa457b8b5

          SHA256

          340ceef8c2d469e5ceb04dcb86bfda6bf9332430a18ee58de4d81b329435cf18

          SHA512

          600b83269e3931aceb58417c1bf44514e0a7e4016e537191823c17eb9cb6db408c287882371cb0b601bb35fb2bf0b6ffbd86e88f49457b4bcdc7e3e6a7cd8681

        • memory/472-107-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/616-1-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/616-0-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/616-8-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-21-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-52-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-28-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-29-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-30-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-27-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-23-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-31-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-33-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-32-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-34-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-38-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-36-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-40-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-39-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-44-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-45-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-43-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-42-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-41-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-47-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-46-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-48-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-51-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-49-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-50-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-53-0x0000000002260000-0x0000000002267000-memory.dmp

          Filesize

          28KB

        • memory/1204-24-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-37-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-35-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-61-0x00000000772F1000-0x00000000772F2000-memory.dmp

          Filesize

          4KB

        • memory/1204-60-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-62-0x0000000077450000-0x0000000077452000-memory.dmp

          Filesize

          8KB

        • memory/1204-71-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-26-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-25-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-4-0x00000000770E6000-0x00000000770E7000-memory.dmp

          Filesize

          4KB

        • memory/1204-22-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-19-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-20-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-17-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-18-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-14-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-16-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-15-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-11-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-13-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-5-0x0000000002A00000-0x0000000002A01000-memory.dmp

          Filesize

          4KB

        • memory/1204-12-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-9-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-147-0x00000000770E6000-0x00000000770E7000-memory.dmp

          Filesize

          4KB

        • memory/1204-10-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1204-7-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/2608-90-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB

        • memory/2848-126-0x0000000000080000-0x0000000000087000-memory.dmp

          Filesize

          28KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.