Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
51a686be3706e9b20b574706403dd537b90ba73327fd21c6732977c15710557b.dll
Resource
win7-20240903-en
General
-
Target
51a686be3706e9b20b574706403dd537b90ba73327fd21c6732977c15710557b.dll
-
Size
504KB
-
MD5
fa65ea94638f2ca3d0186509d1c6715e
-
SHA1
edefec8a0f3b71c0fed784b5435462eec8b8578a
-
SHA256
51a686be3706e9b20b574706403dd537b90ba73327fd21c6732977c15710557b
-
SHA512
e3eedf70cab653e721580f2d5b77216afbf3ba8ad13feb5158c597c420c99d9185f501c1b27c55b6fd40391682c4e43e0be2ae232fb27e8abbe7fe16c8f72b10
-
SSDEEP
12288:/h8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMNM3I9zjD:/8F+Pzr/Hfp4MIYwZckMQmMsXD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2320 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 584 rundll32.exe 584 rundll32.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process 852 2320 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 584 wrote to memory of 2320 584 rundll32.exe 32 PID 584 wrote to memory of 2320 584 rundll32.exe 32 PID 584 wrote to memory of 2320 584 rundll32.exe 32 PID 584 wrote to memory of 2320 584 rundll32.exe 32 PID 2320 wrote to memory of 852 2320 rundll32mgr.exe 33 PID 2320 wrote to memory of 852 2320 rundll32mgr.exe 33 PID 2320 wrote to memory of 852 2320 rundll32mgr.exe 33 PID 2320 wrote to memory of 852 2320 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51a686be3706e9b20b574706403dd537b90ba73327fd21c6732977c15710557b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51a686be3706e9b20b574706403dd537b90ba73327fd21c6732977c15710557b.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD503a048104272c7aabc167e893cc6d3cd
SHA1304fdf6a45f2e4e422365f836ae526af3cd72af6
SHA256cc3aa2d0788746f8e848b6e59142502ca61afe72c380c6f44b353064567b33d5
SHA5120989ecced26ca343f2924b6407299886fe47b59e00ac9e9f51c0e4145d06f64d6aa0db1c2e28a0fcba343609aef39682916a809b786139c45bcc4adb28ec5df1