Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/07/2024, 19:49

General

  • Target

    c3a616358453e48019c7270c1c24c4788acbdbbd17eb1e8882da6670df99b096.dll

  • Size

    796KB

  • MD5

    7c7ea66ba01a57d19668adafa7292f47

  • SHA1

    987fc00ec5d2ec61ecf03b0181f6da93f74a6ab3

  • SHA256

    c3a616358453e48019c7270c1c24c4788acbdbbd17eb1e8882da6670df99b096

  • SHA512

    68e36af98094c40bf065d80594f1b70b225c42063af6e56532341f0ed0e45c7ef78166b3730c98765880d86b1b704094409aaed05845d7907b21a4d5864a2d00

  • SSDEEP

    12288:yBim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:e/nts0Q9K/0ooRQIxAk2wi0N/

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 12 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c3a616358453e48019c7270c1c24c4788acbdbbd17eb1e8882da6670df99b096.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2816
  • C:\Windows\system32\cmstp.exe
    C:\Windows\system32\cmstp.exe
    1⤵
      PID:1996
    • C:\Users\Admin\AppData\Local\6Ct1OC\cmstp.exe
      C:\Users\Admin\AppData\Local\6Ct1OC\cmstp.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1748
    • C:\Windows\system32\raserver.exe
      C:\Windows\system32\raserver.exe
      1⤵
        PID:1336
      • C:\Users\Admin\AppData\Local\LjnjsK0ol\raserver.exe
        C:\Users\Admin\AppData\Local\LjnjsK0ol\raserver.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2532
      • C:\Windows\system32\msconfig.exe
        C:\Windows\system32\msconfig.exe
        1⤵
          PID:536
        • C:\Users\Admin\AppData\Local\T93PgIZhP\msconfig.exe
          C:\Users\Admin\AppData\Local\T93PgIZhP\msconfig.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1696

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\6Ct1OC\VERSION.dll

          Filesize

          800KB

          MD5

          eebe7c2228f682eda3d1efdaafae735a

          SHA1

          2e524f8fc99b5e9f5bf2a5e184c2f0b7a95f310a

          SHA256

          b240d2fc49b758f7a5e767f3ee8072382e093e98d60ba78077dc967c461b239d

          SHA512

          9335b180d84e7b45db07c153d19e95aa207e4b20f678a3a5497a3dfa5577accea313102dd79f8609f128d7f282407ffed8865cba27c5a0fcc2c768074b83e645

        • C:\Users\Admin\AppData\Local\LjnjsK0ol\WTSAPI32.dll

          Filesize

          800KB

          MD5

          7345aaddf64d3bb68708d92693a61cea

          SHA1

          9a6df8961d68484b95f82f25e2323aa7019cdb12

          SHA256

          621f7b493494a1247e40eb9f61b69a5f5522675d54532af6f8286846fa76bbae

          SHA512

          41a7fca9420c155bcb6c0cdd091d349be3645811f65386e0dd87fa30a0e492cab944efd87499642d9c284aa815c826c22a8e5990ee04e919e6c55875a403526d

        • C:\Users\Admin\AppData\Local\T93PgIZhP\MFC42u.dll

          Filesize

          824KB

          MD5

          9528ce7f1b79859b909dc04f614895f8

          SHA1

          3c5f302b93c5201becf50ff29de878023046f1b0

          SHA256

          d4b586ced1fb15e422d9077f9de47e8d24f53f6147b9012c688b36fc54bc9b5c

          SHA512

          3854a8b69bf7a975df375ec283c1c3209ac93d2e64f226d19fe57f90e0de7175fbc40ed887051bd1e33e584055200def30a41b29ed6da85ee8a54b968d35a6a0

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jgencdimntyj.lnk

          Filesize

          1KB

          MD5

          9418517b11ffb498dd4809061cefd295

          SHA1

          e971e546df45f4b53fff39bdfeaabe23bf34a729

          SHA256

          d27c4804ad27b48b09cc4dd25eadb49b99b829d6820888d7a9c728c474ba3101

          SHA512

          04f95a6497a95562769e8794f36209e23efc7cdcdc0edebc75137196b180055c2330f554eedb5627c660091771f7e4722bf53c4164c202991fe82b0477bbf62f

        • \Users\Admin\AppData\Local\6Ct1OC\cmstp.exe

          Filesize

          90KB

          MD5

          74c6da5522f420c394ae34b2d3d677e3

          SHA1

          ba135738ef1fb2f4c2c6c610be2c4e855a526668

          SHA256

          51d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6

          SHA512

          bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a

        • \Users\Admin\AppData\Local\LjnjsK0ol\raserver.exe

          Filesize

          123KB

          MD5

          cd0bc0b6b8d219808aea3ecd4e889b19

          SHA1

          9f8f4071ce2484008e36fdfd963378f4ebad703f

          SHA256

          16abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c

          SHA512

          84291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac

        • \Users\Admin\AppData\Local\T93PgIZhP\msconfig.exe

          Filesize

          293KB

          MD5

          e19d102baf266f34592f7c742fbfa886

          SHA1

          c9c9c45b7e97bb7a180064d0a1962429f015686d

          SHA256

          f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1

          SHA512

          1b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283

        • memory/1224-48-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-11-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-37-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-29-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-28-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-27-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-26-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-25-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-24-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-23-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-22-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-21-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-20-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-18-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-17-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-16-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-14-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-39-0x0000000077420000-0x0000000077422000-memory.dmp

          Filesize

          8KB

        • memory/1224-49-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-3-0x0000000077086000-0x0000000077087000-memory.dmp

          Filesize

          4KB

        • memory/1224-38-0x00000000773F0000-0x00000000773F2000-memory.dmp

          Filesize

          8KB

        • memory/1224-13-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-12-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-32-0x0000000002A30000-0x0000000002A37000-memory.dmp

          Filesize

          28KB

        • memory/1224-10-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-9-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-8-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-4-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

          Filesize

          4KB

        • memory/1224-19-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-7-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-92-0x0000000077086000-0x0000000077087000-memory.dmp

          Filesize

          4KB

        • memory/1224-6-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1224-15-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/1696-102-0x0000000000280000-0x0000000000287000-memory.dmp

          Filesize

          28KB

        • memory/1696-100-0x000007FEF75B0000-0x000007FEF767E000-memory.dmp

          Filesize

          824KB

        • memory/1696-105-0x000007FEF75B0000-0x000007FEF767E000-memory.dmp

          Filesize

          824KB

        • memory/1748-70-0x000007FEF76E0000-0x000007FEF77A8000-memory.dmp

          Filesize

          800KB

        • memory/1748-67-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/1748-65-0x000007FEF76E0000-0x000007FEF77A8000-memory.dmp

          Filesize

          800KB

        • memory/2532-84-0x0000000000090000-0x0000000000097000-memory.dmp

          Filesize

          28KB

        • memory/2532-82-0x000007FEF75B0000-0x000007FEF7678000-memory.dmp

          Filesize

          800KB

        • memory/2532-87-0x000007FEF75B0000-0x000007FEF7678000-memory.dmp

          Filesize

          800KB

        • memory/2816-57-0x000007FEF7610000-0x000007FEF76D7000-memory.dmp

          Filesize

          796KB

        • memory/2816-2-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/2816-0-0x000007FEF7610000-0x000007FEF76D7000-memory.dmp

          Filesize

          796KB