Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
3479e7ee256673ba85659b732500c026cd218f3d79e5596e1605660208d7faa0.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3479e7ee256673ba85659b732500c026cd218f3d79e5596e1605660208d7faa0.dll
Resource
win10v2004-20231215-en
General
-
Target
3479e7ee256673ba85659b732500c026cd218f3d79e5596e1605660208d7faa0.dll
-
Size
2.6MB
-
MD5
c032571b2c494c02194f05e7f476e997
-
SHA1
0b524906ed83ec66969257393f0feaeb52048544
-
SHA256
3479e7ee256673ba85659b732500c026cd218f3d79e5596e1605660208d7faa0
-
SHA512
84df1b59e895b7127d398b7b96034821bc33d8247e7f7d4731815473a1463708be71ff2be5a292f62298ad46540c463e39e541762fb1569e19a1c82ead9b2197
-
SSDEEP
49152:PRP/ddeBQy1lPe22pKpUmmWmFekXPyZ7wlX7zSLxC2X6MYhRcdVhlC4JX4:J/ddeBQy1l2cUmmpFPPy+lrzSLU2X6bW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4172 kss.ini -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe 4392 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4392 rundll32.exe Token: SeIncBasePriorityPrivilege 4392 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4392 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4392 4504 rundll32.exe 14 PID 4504 wrote to memory of 4392 4504 rundll32.exe 14 PID 4504 wrote to memory of 4392 4504 rundll32.exe 14 PID 4392 wrote to memory of 4172 4392 rundll32.exe 18 PID 4392 wrote to memory of 4172 4392 rundll32.exe 18 PID 4392 wrote to memory of 4172 4392 rundll32.exe 18
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3479e7ee256673ba85659b732500c026cd218f3d79e5596e1605660208d7faa0.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\kss.inic:\kss.ini2⤵
- Executes dropped EXE
PID:4172 -
C:\Program Files\QQExternal.exe"C:\Program Files\QQExternal.exe"3⤵PID:2236
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3479e7ee256673ba85659b732500c026cd218f3d79e5596e1605660208d7faa0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4504
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD5eb6513ed5c48d62364a6aba2e13e426b
SHA1d928b7f951ca8ecdf8191ed19f875931b0b911fb
SHA256154477aef1036ee457834d5f09eb601360eb71859cc5f766778953b9c1bcfe6f
SHA512675a41d79bebd129c0e539455482c7cc41a675de9c8b5f6927f28dfb6deb60af9e7202c908778cdcc09ab12fdaa80a9e4ac4e77074dd046a6a1322e0e8c34b82
-
Filesize
1.1MB
MD504df61b9ecb2049a4396a40825834427
SHA19f43a1f20819f018e6081ac4603acc6d516f1e99
SHA256f5873b29d8de18320424e98ecfe93dd7eb8026abedd3165e9e1440ff5c6b1aad
SHA51240bb21e25f8901dca9164ff8af31e5c667c9bb66d3d3e06150f3d132689838084c5f5c8f698a91ac0c3d19aa186b531a7a88c91b8e362520c287cc8b03403ef3