Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll
Resource
win10v2004-20250129-en
General
-
Target
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll
-
Size
984KB
-
MD5
89f99b617454ae1d26f9c5614f19fd30
-
SHA1
43194372fae7b50a95e00580ce5d64134e4c1b7d
-
SHA256
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277
-
SHA512
fb0445aba4301466b7c5d8dea9afbf87e0ab5d0bbbcee924d22af97700370f0dd13a80691ab322ffabbbb16e287df160344f5f7a54b1834be2b0fda0089470a3
-
SSDEEP
24576:yWyoHFMVMKkN3ZvxEhb0IsaQ4KriCo0j6Ijg:1nuVMK6vx2RsIKNrj
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1152-5-0x0000000002E80000-0x0000000002E81000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2392 TpmInit.exe 2808 tcmsetup.exe 2596 mblctr.exe -
Loads dropped DLL 7 IoCs
pid Process 1152 Process not Found 2392 TpmInit.exe 1152 Process not Found 2808 tcmsetup.exe 1152 Process not Found 2596 mblctr.exe 1152 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\NETWOR~1\\PqW9FZ1v\\tcmsetup.exe" Process not Found -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TpmInit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found 1152 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2784 1152 Process not Found 30 PID 1152 wrote to memory of 2784 1152 Process not Found 30 PID 1152 wrote to memory of 2784 1152 Process not Found 30 PID 1152 wrote to memory of 2392 1152 Process not Found 31 PID 1152 wrote to memory of 2392 1152 Process not Found 31 PID 1152 wrote to memory of 2392 1152 Process not Found 31 PID 1152 wrote to memory of 2676 1152 Process not Found 32 PID 1152 wrote to memory of 2676 1152 Process not Found 32 PID 1152 wrote to memory of 2676 1152 Process not Found 32 PID 1152 wrote to memory of 2808 1152 Process not Found 33 PID 1152 wrote to memory of 2808 1152 Process not Found 33 PID 1152 wrote to memory of 2808 1152 Process not Found 33 PID 1152 wrote to memory of 1932 1152 Process not Found 34 PID 1152 wrote to memory of 1932 1152 Process not Found 34 PID 1152 wrote to memory of 1932 1152 Process not Found 34 PID 1152 wrote to memory of 2596 1152 Process not Found 35 PID 1152 wrote to memory of 2596 1152 Process not Found 35 PID 1152 wrote to memory of 2596 1152 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵PID:2784
-
C:\Users\Admin\AppData\Local\gQIY9vvPD\TpmInit.exeC:\Users\Admin\AppData\Local\gQIY9vvPD\TpmInit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2392
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵PID:2676
-
C:\Users\Admin\AppData\Local\D1PDH\tcmsetup.exeC:\Users\Admin\AppData\Local\D1PDH\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2808
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:1932
-
C:\Users\Admin\AppData\Local\DYOCi8X\mblctr.exeC:\Users\Admin\AppData\Local\DYOCi8X\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992KB
MD5bb585e95c2e54153402082e310886bc2
SHA122a8af6601f1327ea204503b38dea61d6974033c
SHA25642aaea33fb307e82f04356303a6661daf1bde7ddff85e9e02178754c94a8de4f
SHA512a262cbbe6c655f1894e14c3785bba34841eddef060cd719e266cbec22e8fdbc390e36456adf4ef247eb97425e2f3feb171ffe5293fb0ad453a966cfec6828962
-
Filesize
992KB
MD513da53f121f31924506b52561178497c
SHA1b3bcb3b10c81437d20f0f3a3d69ed8a6c05e2ac8
SHA2562602b723570b42d88bd98ffb0ed48fe96746634f37fdf2c40258672fea036eef
SHA512ead8adba2417399100ceceada041e4892febbfe0514a254ed3441f946189eb5d17637441250f54b92def273f9e3c83638236ceb7b3d3b4a180988f4a0729f1c7
-
Filesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
Filesize
984KB
MD5fa8ec014ef855310d55ccb6568f6a99d
SHA1fdee2af52e87290dbcfcf68cc1e18c112c3673bd
SHA25638a10adb5f66def5e863a1bd7557eb02c4057aa687b0f418f13fc71dab346d31
SHA512f9784ac1e0a862e83d7a45575bc5fd72b141c966f0cf1654b5cafad57296b611e415edece99db4742fca74e4ecac63e416955101f33415b6b907e612c4515a65
-
Filesize
1KB
MD5c8cc4b02aa13f543fad89cb497319bd8
SHA105b2d4f46d3dac017d65a6d3ad79524aee387bb3
SHA25681a19588f1a527ae1cb2a916a92bd35f365e7f82c35372ba9565990b04d515a4
SHA512caa25164e873d58182a805eb6fef45d1dad9cf27ad2b9098fc8d2a150ed76bcf266c2571865ac845886b71678c64203b0f8560ca497120ec48c9ddbeae31f0dc
-
Filesize
15KB
MD50b08315da0da7f9f472fbab510bfe7b8
SHA133ba48fd980216becc532466a5ff8476bec0b31c
SHA256e19556bb7aa39bbd5f0d568a95aec0b3af18dda438cc5737f945243b24d106e7
SHA512c30501546efe2b0c003ef87ac381e901c69ddfc6791c6a5102cff3a07f56555d94995a4413b93036821aa214fc31501fa87eb519e1890ef75b2ec497983ffd58
-
Filesize
112KB
MD58b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d