Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
56e4c467f5c0fd924bd6d59fa3ba0895.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56e4c467f5c0fd924bd6d59fa3ba0895.exe
Resource
win10v2004-20231215-en
General
-
Target
56e4c467f5c0fd924bd6d59fa3ba0895.exe
-
Size
49KB
-
MD5
56e4c467f5c0fd924bd6d59fa3ba0895
-
SHA1
181430094ab36885611ce648d306064a2fba5131
-
SHA256
d06d804ed592436dea486beb37ad20ec83ba44ff71a3524af72b61ccd7affce7
-
SHA512
c0df553f05a93b89f2d22b387911f11379c422e8efd8800709a9044574fc337223d6b5007d212c4e3c527fbe7075f0aa9d1a0e02d9939a75bfb2dd6fb1bf4d15
-
SSDEEP
768:26DW8cxflagfBG5omPIzVFtFnyZ+y+wt2vYOKvB8v:LyjBfBoPIz7t4ZV+wt2hKvuv
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 4168 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSServer = "rundll32.exe C:\\Windows\\system32\\iifdbCVp.dll,#1" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ddcBTMdc.dll 56e4c467f5c0fd924bd6d59fa3ba0895.exe File created C:\Windows\SysWOW64\ddcBTMdc.dll 56e4c467f5c0fd924bd6d59fa3ba0895.exe File created C:\Windows\SysWOW64\iifdbCVp.dll 56e4c467f5c0fd924bd6d59fa3ba0895.exe File opened for modification C:\Windows\SysWOW64\iifdbCVp.dll 56e4c467f5c0fd924bd6d59fa3ba0895.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5AEE532C-7C2F-4E5C-A044-096846CB9490} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5AEE532C-7C2F-4E5C-A044-096846CB9490}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5AEE532C-7C2F-4E5C-A044-096846CB9490}\InprocServer32\ = "C:\\Windows\\SysWow64\\iifdbCVp.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5AEE532C-7C2F-4E5C-A044-096846CB9490}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe 4168 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2532 wrote to memory of 628 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 3 PID 2532 wrote to memory of 4168 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 101 PID 2532 wrote to memory of 4168 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 101 PID 2532 wrote to memory of 4168 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 101 PID 2532 wrote to memory of 4040 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 102 PID 2532 wrote to memory of 4040 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 102 PID 2532 wrote to memory of 4040 2532 56e4c467f5c0fd924bd6d59fa3ba0895.exe 102
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\56e4c467f5c0fd924bd6d59fa3ba0895.exe"C:\Users\Admin\AppData\Local\Temp\56e4c467f5c0fd924bd6d59fa3ba0895.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\iifdbCVp.dll,a2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Users\Admin\AppData\Local\Temp\56e4c467f5c0fd924bd6d59fa3ba0895.exe"2⤵PID:4040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD59a7ef09167a6f4433681b94351509043
SHA1259b1375ed8e84943ca1d42646bb416325c89e12
SHA256d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7
SHA51296b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df
-
Filesize
37KB
MD5934e152ce53a38343e677c258993f485
SHA18f4ec32a948357d7ba8098ed9239f0207eac18ef
SHA2568ec2cb4266d9b40589b59ebf2ff2e6233b253b809cc9aca1b4e02eb97a948f34
SHA51261114285057e494f18db08701dd16dd3650f76be8c4f36b7cceec45a62fd47c4ca77cd6829eaa015312bb625f9291168ccb6c1b342a07578057df29be331a326