Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/01/2025, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789aN.dll
Resource
win7-20240903-en
General
-
Target
12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789aN.dll
-
Size
724KB
-
MD5
16ff194261d802bb962f116de20281f0
-
SHA1
fe8d67b2362a86ad47bf63abf68ce997cdc42ea0
-
SHA256
12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789a
-
SHA512
9cd53fbce376a94a99ea197bb2d8376e932e2c8a843708205c8c613492657ed1aa731b4bd4d3cdc1e4be8d3229865af7d0bcdeb655e44fd0f53560785be1ecf7
-
SSDEEP
12288:KO3+ivi0RNOR/5DH2InMtdhtvX2tvJljUWcJxm/Osj3lx7l6X0k97L4HAF3it:7vdvOZ9H2+Mt7tvX2tvJljT/mi1xJ6t6
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2532-0-0x000007FEF6DF0000-0x000007FEF6EA5000-memory.dmp dridex_ldr_dmod behavioral1/memory/1244-16-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_ldr_dmod behavioral1/memory/1244-22-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_ldr_dmod behavioral1/memory/1244-34-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_ldr_dmod behavioral1/memory/1244-35-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_ldr_dmod behavioral1/memory/2532-43-0x000007FEF6DF0000-0x000007FEF6EA5000-memory.dmp dridex_ldr_dmod behavioral1/memory/2180-53-0x000007FEF6EB0000-0x000007FEF6F66000-memory.dmp dridex_ldr_dmod behavioral1/memory/2180-58-0x000007FEF6EB0000-0x000007FEF6F66000-memory.dmp dridex_ldr_dmod behavioral1/memory/2312-70-0x000007FEF66F0000-0x000007FEF67A6000-memory.dmp dridex_ldr_dmod behavioral1/memory/2312-75-0x000007FEF66F0000-0x000007FEF67A6000-memory.dmp dridex_ldr_dmod behavioral1/memory/2984-90-0x000007FEF66F0000-0x000007FEF67A6000-memory.dmp dridex_ldr_dmod -
resource yara_rule behavioral1/memory/1244-5-0x0000000002A90000-0x0000000002A91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2180 calc.exe 2312 dwm.exe 2984 vmicsvc.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 Process not Found 2180 calc.exe 1244 Process not Found 2312 dwm.exe 1244 Process not Found 2984 vmicsvc.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dnfwvyvycst = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\whRi4i\\dwm.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA calc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2744 1244 Process not Found 31 PID 1244 wrote to memory of 2744 1244 Process not Found 31 PID 1244 wrote to memory of 2744 1244 Process not Found 31 PID 1244 wrote to memory of 2180 1244 Process not Found 32 PID 1244 wrote to memory of 2180 1244 Process not Found 32 PID 1244 wrote to memory of 2180 1244 Process not Found 32 PID 1244 wrote to memory of 2704 1244 Process not Found 33 PID 1244 wrote to memory of 2704 1244 Process not Found 33 PID 1244 wrote to memory of 2704 1244 Process not Found 33 PID 1244 wrote to memory of 2312 1244 Process not Found 34 PID 1244 wrote to memory of 2312 1244 Process not Found 34 PID 1244 wrote to memory of 2312 1244 Process not Found 34 PID 1244 wrote to memory of 2976 1244 Process not Found 35 PID 1244 wrote to memory of 2976 1244 Process not Found 35 PID 1244 wrote to memory of 2976 1244 Process not Found 35 PID 1244 wrote to memory of 2984 1244 Process not Found 36 PID 1244 wrote to memory of 2984 1244 Process not Found 36 PID 1244 wrote to memory of 2984 1244 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12e83b82323d48939373b00da810964eb14b176f112a61437dcc8b83483d789aN.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
C:\Windows\system32\calc.exeC:\Windows\system32\calc.exe1⤵PID:2744
-
C:\Users\Admin\AppData\Local\ylFb\calc.exeC:\Users\Admin\AppData\Local\ylFb\calc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2180
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:2704
-
C:\Users\Admin\AppData\Local\L9qFERfaz\dwm.exeC:\Users\Admin\AppData\Local\L9qFERfaz\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2312
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵PID:2976
-
C:\Users\Admin\AppData\Local\flq6Ao0J\vmicsvc.exeC:\Users\Admin\AppData\Local\flq6Ao0J\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728KB
MD574c713984db97b888fba788937945767
SHA1993d0daabbe439a4c4824c46d4e9753eddc06516
SHA256b28bcfcde9ee524d0e8d3bcc5741269ef35086568d5ff6b680a7a0c99993ff88
SHA512b5781a367b81e88b867d0d780e64cdff8e9adc88d2f824f2d2144b558db3a45cbdfcc04a073ea260111325470292270516b9b43586aca12da863ae46f4eadf09
-
Filesize
728KB
MD53b1f9a727a7151ec7535edf241405fda
SHA19e892f0159f3aff5c25a369b3ba63aecfb878c2c
SHA256ccfa6e19fc98214831002568ccd2cb4f7627a28504971e0276dc6fbd893fc7f0
SHA512ac10eb00c1aa5bf103bae6f717890e6c396e0d6abea5c2c6ab26b37e78e34638cbf021a4022cc062b122bc1dc2d36bdd93e98ab061ad78f495ef9672eaf66cef
-
Filesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
Filesize
728KB
MD59772c6848fdf0962e92837fcc5fb482a
SHA111e353b9c0a3b57798059692584cdd2fecc5e9f3
SHA25658fa144e0e33b1bc8008dab637885769a15789de04039308e0f967d496b4593d
SHA512ae03f11e7e776cb058f123219332d2931521830750e9f1ed1dde6a0c21941a224143b15426b451fc1129fcfe94d02c8fe3486e2849064ad488c7b4fbccc2ec9a
-
Filesize
1KB
MD57189aa819b67ae33c6fb050e564cffab
SHA1021d1504bdc434309752c94ebe54190fea43d5dc
SHA256085038785b284e69995283e5c5b362c4161b964c40d00485ecc4660f675bafe7
SHA512c7305fd9f6c25501fdac777f848bd0ef183c6e738f82df63e142277e70251b1af3f5a0fe4daf55de62c732b89649312842677628c81f06302e92f9eb0c90a9b9
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851
-
Filesize
897KB
MD510e4a1d2132ccb5c6759f038cdb6f3c9
SHA142d36eeb2140441b48287b7cd30b38105986d68f
SHA256c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
SHA5129bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d