Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
aedf7741c1770ade830ddff75cc1ed4a80b864f63cadb83b1b08ef19267ea5ee.dll
Resource
win7-20241010-en
General
-
Target
aedf7741c1770ade830ddff75cc1ed4a80b864f63cadb83b1b08ef19267ea5ee.dll
-
Size
288KB
-
MD5
7e28649fc0e3db21619c4667baa77c2e
-
SHA1
670527aa4917ed5bb2ce77f1a92a1cca0cc4482f
-
SHA256
aedf7741c1770ade830ddff75cc1ed4a80b864f63cadb83b1b08ef19267ea5ee
-
SHA512
29b83ada3e009c294c64709286496aea824aa43da15b313429b8f38f8680d1dad6a0b601085284b86520135f05b62cad4fb7d9017e8ac56d1ee6ef775216b579
-
SSDEEP
6144:5CIGPj038tAgFMldWNX+fNErZiYqVHS9fE5M7i4y39:yj038t/FMldW4fAZiYqVHY80w39
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2832 rundll32.exe 2832 rundll32.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process 2900 2860 WerFault.exe 3068 2832 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2832 2772 rundll32.exe 30 PID 2772 wrote to memory of 2832 2772 rundll32.exe 30 PID 2772 wrote to memory of 2832 2772 rundll32.exe 30 PID 2772 wrote to memory of 2832 2772 rundll32.exe 30 PID 2772 wrote to memory of 2832 2772 rundll32.exe 30 PID 2772 wrote to memory of 2832 2772 rundll32.exe 30 PID 2772 wrote to memory of 2832 2772 rundll32.exe 30 PID 2832 wrote to memory of 2860 2832 rundll32.exe 31 PID 2832 wrote to memory of 2860 2832 rundll32.exe 31 PID 2832 wrote to memory of 2860 2832 rundll32.exe 31 PID 2832 wrote to memory of 2860 2832 rundll32.exe 31 PID 2832 wrote to memory of 3068 2832 rundll32.exe 32 PID 2832 wrote to memory of 3068 2832 rundll32.exe 32 PID 2832 wrote to memory of 3068 2832 rundll32.exe 32 PID 2832 wrote to memory of 3068 2832 rundll32.exe 32 PID 2860 wrote to memory of 2900 2860 rundll32mgr.exe 33 PID 2860 wrote to memory of 2900 2860 rundll32mgr.exe 33 PID 2860 wrote to memory of 2900 2860 rundll32mgr.exe 33 PID 2860 wrote to memory of 2900 2860 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aedf7741c1770ade830ddff75cc1ed4a80b864f63cadb83b1b08ef19267ea5ee.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aedf7741c1770ade830ddff75cc1ed4a80b864f63cadb83b1b08ef19267ea5ee.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 924⤵
- Loads dropped DLL
- Program crash
PID:2900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2283⤵
- Program crash
PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5623d4fbb23eede885545651c25bc9b28
SHA1290d67841d6bd8ce68ae88d8f4a3e3bdca072143
SHA2561546eae84af97be2cfd8127c75f79b03bd18cc9f44630d3e4e87a5074c644050
SHA512e489e9316626a645581fb5f0db8458df951643ebdb5a9e9224b3a3f4d9808efbda3a1ad260d865bd49ee385ddf46188072700e0536d3a335cacbaba998ea2f2a