Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
04e388933eab8600c45e65e2470c6b33.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04e388933eab8600c45e65e2470c6b33.dll
Resource
win10v2004-20231215-en
General
-
Target
04e388933eab8600c45e65e2470c6b33.dll
-
Size
236KB
-
MD5
04e388933eab8600c45e65e2470c6b33
-
SHA1
6ab499dd9e9d14578db0bed8fb7ca63a4a08e1d2
-
SHA256
dd14d8c8bf76437503cc28ae10cdbf2d7a914833c5a111b368bd1a7433ec7201
-
SHA512
175f89cfcf465ebad4d7752d18ced332e927f2e13b9de40220305cd259c5db9f14e1b3a4480d8fe41db92116556230de650a16b1bc8282490c1fb581cf9f3864
-
SSDEEP
1536:1dKaTHN2ymZ0ofa5uQm4V7HG8ldINh+RhFtFftCgpcGO5lPf/XG8GmGwktbG:1Y4tIQG8XAmbFfaGc1fawk1G
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\cjsss = "{a94447f1-21cc-7611-32dd-21cccf79cb41}" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\pwfff.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\pwfff.dll rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a94447f1-21cc-7611-32dd-21cccf79cb41} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a94447f1-21cc-7611-32dd-21cccf79cb41}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a94447f1-21cc-7611-32dd-21cccf79cb41}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a94447f1-21cc-7611-32dd-21cccf79cb41}\InprocServer32\ = "C:\\Windows\\SysWow64\\xennn.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a94447f1-21cc-7611-32dd-21cccf79cb41}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2028 2468 rundll32.exe 14 PID 2468 wrote to memory of 2028 2468 rundll32.exe 14 PID 2468 wrote to memory of 2028 2468 rundll32.exe 14 PID 2468 wrote to memory of 2028 2468 rundll32.exe 14 PID 2468 wrote to memory of 2028 2468 rundll32.exe 14 PID 2468 wrote to memory of 2028 2468 rundll32.exe 14 PID 2468 wrote to memory of 2028 2468 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04e388933eab8600c45e65e2470c6b33.dll,#11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2028
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04e388933eab8600c45e65e2470c6b33.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d2ea601e249809349bf317e4e97451e4
SHA13b18e9ec802bc60c8e8a48bd1dc2933a658e7551
SHA25662092009e080eabd26386bd6d1b4a064f6c1389a12b21a8e33b6ff7e682c34bc
SHA51231ec1c407e8a68596b95c7ba92268d6674c9ae274223c4be6bc92f2ba6beb15d6a1e15acf4b386d8017f7ee1a463ff50b72f1879e71f7f3845c718410d9b80d1