Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll
Resource
win10v2004-20240508-en
General
-
Target
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll
-
Size
992KB
-
MD5
97cc324c3e119a1e92d47865a2e821be
-
SHA1
d95f93e8b18b901a3454370e35c2172cd47149da
-
SHA256
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe
-
SHA512
f806756c4ccb464ec2866e9aee8ee21cf81bb88cfa906e0055ebb352e287280b8f75b06bef987a524b401a935f0b7dd81be3221716edfe6dda59e9fad7f0dcc4
-
SSDEEP
12288:nrHGPv5SmptEDmUWuVZkxikdXcqifhqq:6PvQmptPUBDkxBdXcHfhq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1232 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mqdbvnnwgmqj = "\"C:\\Users\\Admin\\AppData\\Roaming\\DGgkf\\dpapimig.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\0502\dpapimig.exe cmd.exe File opened for modification C:\Windows\system32\0502\dpapimig.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 352 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\Agjmqv.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\MSCFile Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 rundll32.exe 2932 rundll32.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2784 1232 Process not Found 28 PID 1232 wrote to memory of 2784 1232 Process not Found 28 PID 1232 wrote to memory of 2784 1232 Process not Found 28 PID 1232 wrote to memory of 2680 1232 Process not Found 29 PID 1232 wrote to memory of 2680 1232 Process not Found 29 PID 1232 wrote to memory of 2680 1232 Process not Found 29 PID 1232 wrote to memory of 2580 1232 Process not Found 31 PID 1232 wrote to memory of 2580 1232 Process not Found 31 PID 1232 wrote to memory of 2580 1232 Process not Found 31 PID 2580 wrote to memory of 1916 2580 cmd.exe 33 PID 2580 wrote to memory of 1916 2580 cmd.exe 33 PID 2580 wrote to memory of 1916 2580 cmd.exe 33 PID 1232 wrote to memory of 1404 1232 Process not Found 34 PID 1232 wrote to memory of 1404 1232 Process not Found 34 PID 1232 wrote to memory of 1404 1232 Process not Found 34 PID 1232 wrote to memory of 1616 1232 Process not Found 35 PID 1232 wrote to memory of 1616 1232 Process not Found 35 PID 1232 wrote to memory of 1616 1232 Process not Found 35 PID 1232 wrote to memory of 2804 1232 Process not Found 36 PID 1232 wrote to memory of 2804 1232 Process not Found 36 PID 1232 wrote to memory of 2804 1232 Process not Found 36 PID 1232 wrote to memory of 2844 1232 Process not Found 37 PID 1232 wrote to memory of 2844 1232 Process not Found 37 PID 1232 wrote to memory of 2844 1232 Process not Found 37 PID 1232 wrote to memory of 2868 1232 Process not Found 39 PID 1232 wrote to memory of 2868 1232 Process not Found 39 PID 1232 wrote to memory of 2868 1232 Process not Found 39 PID 2868 wrote to memory of 2908 2868 eventvwr.exe 40 PID 2868 wrote to memory of 2908 2868 eventvwr.exe 40 PID 2868 wrote to memory of 2908 2868 eventvwr.exe 40 PID 2908 wrote to memory of 352 2908 cmd.exe 42 PID 2908 wrote to memory of 352 2908 cmd.exe 42 PID 2908 wrote to memory of 352 2908 cmd.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:2784
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\eTJVZry.cmd1⤵PID:2680
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{7b98aa95-b212-23e5-3cc8-426819761c96}"1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{7b98aa95-b212-23e5-3cc8-426819761c96}"2⤵PID:1916
-
-
C:\Windows\system32\logagent.exeC:\Windows\system32\logagent.exe1⤵PID:1404
-
C:\Windows\system32\cleanmgr.exeC:\Windows\system32\cleanmgr.exe1⤵PID:1616
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:2804
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\j78Arn.cmd1⤵
- Drops file in System32 directory
PID:2844
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\Agjmqv.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Rkbail" /SC minute /MO 60 /TR "C:\Windows\system32\0502\dpapimig.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125B
MD593beeaad16691e686d81ce955663c40a
SHA1c9bab67abbb9121c112dd2cfadb1bdb971437229
SHA256c0a85ad82eb391d658ca4c94a501cc931c88f683f5350cbe95db5abac19df583
SHA512efad09d85c0c3e9ab9097ee0cfb29c2c4574722a6d877c060cf8343434a4d5faa277d66dfa9efe292c1396735bc2fd09ee724bea17dc83dd8f3054bb9e66411b
-
Filesize
1.2MB
MD581ca88ae2655695ab6728fff5db92371
SHA10489c0153e92adf8393ea3d8137436ae12046419
SHA2563f4253e02f445cd7315f044e9b59d345a39ae641a8d061207c3fe05b4240a9b5
SHA5123d0cb431d6c9bbda31ada5ef9e3a40320fb7d2309dacbfba975af05a41c7ce1be57e31ad953c2f98a007253cb5460133d0770095c20c29834edb01be0e7645c2
-
Filesize
227B
MD56c68127cf224e228f3ecd97857c1c094
SHA1dde71d781785e9015e0fd8c5f80faa6c6d2c2df7
SHA256b660fb15efd1945bc6a02261b6be13706769ab5049324dcd417aae098177641a
SHA512af5c1c87ac924ee374da8fdbdb9d343dbd2d3c606bd94c5df70a495bf57d3c6af63267f183e76c04a900b1b1779010c3ef235b255b5eae81a6a8153cc6474426
-
Filesize
1.2MB
MD5283f73f0127dfc7749a1fa7017209a1a
SHA1105b8e8b629f8251ebd71170263c6d9ac55b0bab
SHA256393799f88c256fa41bea730af81ef5273ce07f8ad918374dc78b1bcd1515cc5e
SHA512106c8c07bec1b7592d0c5105f9fead70300488a2b1b68772cc558b2a8a678c24972b7ad837b3facf24bc550cfa0f08c0cdb70d8ecba7e51695643cd8884ec5dc
-
Filesize
191B
MD538a838baab6a4cdee81bc70a5ba5fc78
SHA1be9467e61cb20503ee6cce6cb42ea9c798c20fa8
SHA256726201df45310074a2abe21ebaf89fb1e769c897dea8b3295c1091b683efc283
SHA5129829a347f19ea33e12616aa042ab3e05cc2d22d59ce3fe74af0fd8bbdcab46959c6567c8359d843040399588f8d76287ee8cae99fad726ca8a05cc53913194dc
-
Filesize
73KB
MD50e8b8abea4e23ddc9a70614f3f651303
SHA16d332ba4e7a78039f75b211845514ab35ab467b2
SHA25666fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1
SHA5124feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc
-
Filesize
884B
MD5e104744bb07a2b9bd48e8c177c636521
SHA10dc795ac6d8a8814a80abab440f4aac59ceca292
SHA25697b6d14e0c7bc81cf0aa4876da96256536ecea920204cd3b14de3a49d13ea5ad
SHA512df4335fc1eb203ceef59b64c9fccac328e297257082f76a48b853c4bc7992edc8eafc481a438d9c7549d9a4fa7deec5ee5a2bfc59388b2e6d7d09f2e441ea5a0