Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
6bd2b7e11342715405af352c81015220N.dll
Resource
win7-20240704-en
General
-
Target
6bd2b7e11342715405af352c81015220N.dll
-
Size
233KB
-
MD5
6bd2b7e11342715405af352c81015220
-
SHA1
67fbce6ebc381e01ab31d75e4e639ba00bcb1068
-
SHA256
e901fe3c38c4be94bacb5d3b74ac1b6dc8a43b9aff1cb5d219228cce90057f95
-
SHA512
23ffd95f7042ede946c49e94014f8600a19445dd2823d55bb98bf79dce64a0c390c88d37f296fe4c937424adadb833eb30faec060102692a6150a99ebff07e91
-
SSDEEP
3072:3nQfaIFaPkBh1iDDxqBta5aenZ84irt6b6aXC:gff0Dt06ae+4+tPaXC
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2280 rundll32mgr.exe 2120 hrlC542.tmp 2720 kkmiuy.exe -
Loads dropped DLL 12 IoCs
pid Process 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2248 rundll32.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2720 kkmiuy.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kkmiuy.exe hrlC542.tmp File created C:\Windows\SysWOW64\gei33.dll kkmiuy.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\kkmiuy.exe hrlC542.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 2496 2280 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrlC542.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkmiuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2248 2272 rundll32.exe 30 PID 2272 wrote to memory of 2248 2272 rundll32.exe 30 PID 2272 wrote to memory of 2248 2272 rundll32.exe 30 PID 2272 wrote to memory of 2248 2272 rundll32.exe 30 PID 2272 wrote to memory of 2248 2272 rundll32.exe 30 PID 2272 wrote to memory of 2248 2272 rundll32.exe 30 PID 2272 wrote to memory of 2248 2272 rundll32.exe 30 PID 2248 wrote to memory of 2280 2248 rundll32.exe 31 PID 2248 wrote to memory of 2280 2248 rundll32.exe 31 PID 2248 wrote to memory of 2280 2248 rundll32.exe 31 PID 2248 wrote to memory of 2280 2248 rundll32.exe 31 PID 2248 wrote to memory of 2120 2248 rundll32.exe 32 PID 2248 wrote to memory of 2120 2248 rundll32.exe 32 PID 2248 wrote to memory of 2120 2248 rundll32.exe 32 PID 2248 wrote to memory of 2120 2248 rundll32.exe 32 PID 2280 wrote to memory of 2496 2280 rundll32mgr.exe 33 PID 2280 wrote to memory of 2496 2280 rundll32mgr.exe 33 PID 2280 wrote to memory of 2496 2280 rundll32mgr.exe 33 PID 2280 wrote to memory of 2496 2280 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bd2b7e11342715405af352c81015220N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bd2b7e11342715405af352c81015220N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\hrlC542.tmpC:\Users\Admin\AppData\Local\Temp\hrlC542.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
C:\Windows\SysWOW64\kkmiuy.exeC:\Windows\SysWOW64\kkmiuy.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5dfec8754729106e198a4cdfc20289e06
SHA1a7ee407fdb27f22799fd79e985b0f6eabe0e26b1
SHA2561e11dbc5df02774f245b5fbec0b0ae7f453defece78456c44197a9f1c2275822
SHA5127fa06853706d6a660182dd1a31f1ec3b4d5f27b8520c11c1dd5e9331fb5f3821746ec1130cc289f7468a5f09d731d38012d68fb7dead2dc8a5122e5df8302f68
-
Filesize
9KB
MD51f52809549866ed5302ef4dddf07cfd5
SHA1471347876109e1d68e9bb1d8f45075ba9f539d60
SHA256df3e3e7017f363678a7f1ce3f3286f4e816a7e62fea13245d0ca31195b86aac9
SHA512947411bb6cafb9fdf9af35a6e9753c6751314a1f0547d1b1b86523e7340ff35acece0f47cad9a023fd8e57cd1f4eed36974dd212124c97163598a2fb87733c9b
-
Filesize
202KB
MD5fa768e720ef3b60d4b239e280240a15e
SHA1fe82995aeae95f06a743c6c37b6a7bb2119e72b4
SHA256ad51b691b4a329b286f4e3387f5f504b43b720d731eedab8742b92f454e401e5
SHA5121c24b660702d2a3ffabee76df4d3ae518d0d1d159fb45c3be0cc383eb876361377b838b98aa441ae562580190de530e07ff00ad1d82d2aca7ad172f41076fdcd