Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
c95d7cdcb9e6813c0969c7c221e8d9a0f9371f607ce4b0311914960e9ab90826.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c95d7cdcb9e6813c0969c7c221e8d9a0f9371f607ce4b0311914960e9ab90826.dll
Resource
win10v2004-20240802-en
General
-
Target
c95d7cdcb9e6813c0969c7c221e8d9a0f9371f607ce4b0311914960e9ab90826.dll
-
Size
137KB
-
MD5
fe68744c7e11bbfd54fb15f702673398
-
SHA1
5d546edca09585c47b678693f7f727d5039a382e
-
SHA256
c95d7cdcb9e6813c0969c7c221e8d9a0f9371f607ce4b0311914960e9ab90826
-
SHA512
d774532f70aa79294b6d83dbe0119f597b5edbd736c80d838a64b54d5417718ae88b483e3b671759a291a9d197e2dc060fe3ba909fc8bf0d8bd02c5cfa681e96
-
SSDEEP
3072:gR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:l25GgFny61mrad
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Port Monitors 1 TTPs 2 IoCs
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor\Driver = "scsimon.dll" rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Spooler\ImagePath = "Spoolsv.exe" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\com\comb.dll rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\ComBack.Dll rundll32.exe File created C:\Windows\AppPatch\ComBack.Dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4452 4792 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4792 1852 rundll32.exe 83 PID 1852 wrote to memory of 4792 1852 rundll32.exe 83 PID 1852 wrote to memory of 4792 1852 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c95d7cdcb9e6813c0969c7c221e8d9a0f9371f607ce4b0311914960e9ab90826.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c95d7cdcb9e6813c0969c7c221e8d9a0f9371f607ce4b0311914960e9ab90826.dll,#12⤵
- Boot or Logon Autostart Execution: Port Monitors
- Sets service image path in registry
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 6203⤵
- Program crash
PID:4452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4792 -ip 47921⤵PID:1788