Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll
Resource
win10v2004-20250217-en
General
-
Target
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll
-
Size
137KB
-
MD5
07a5b7c2b0ecb4c0fce3dc1854b19c06
-
SHA1
a5424f674292d9bcf1d6198540e2289f889de042
-
SHA256
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf
-
SHA512
8919c247ab8fcf05a785b0dcc3b579fb7a7285aa6a2b46c7f2426857632d8f1de593e8e2e50f054adcf78a193fd32367bb41d9e4ae8a0a61adbfd03b67d4faa2
-
SSDEEP
3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu2:G25GgFny61mraQ
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/3468-4-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral2/memory/3468-8-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral2/memory/3468-41-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat -
Gh0strat family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 3468 rundll32.exe -
Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor\Driver = "scsimon.dll" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port Spoolsv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor\Driver = "scsimon.dll" rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports Spoolsv.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Spooler\ImagePath = "Spoolsv.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Spooler\ImagePath = "Spoolsv.exe" svchost.exe -
ACProtect 1.3x - 1.4x DLL software 16 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/3468-4-0x0000000010000000-0x000000001001C000-memory.dmp acprotect behavioral2/memory/3468-5-0x0000000002880000-0x000000000289D000-memory.dmp acprotect behavioral2/memory/3468-8-0x0000000010000000-0x000000001001C000-memory.dmp acprotect behavioral2/memory/3468-15-0x0000000002880000-0x000000000289D000-memory.dmp acprotect behavioral2/memory/3468-13-0x0000000002880000-0x000000000289D000-memory.dmp acprotect behavioral2/memory/3468-12-0x0000000002880000-0x000000000289D000-memory.dmp acprotect behavioral2/memory/3468-11-0x0000000002880000-0x000000000289D000-memory.dmp acprotect behavioral2/memory/3468-9-0x0000000002880000-0x000000000289D000-memory.dmp acprotect behavioral2/memory/1844-25-0x0000000003220000-0x000000000323D000-memory.dmp acprotect behavioral2/memory/1844-24-0x0000000003220000-0x000000000323D000-memory.dmp acprotect behavioral2/memory/1844-29-0x0000000003220000-0x000000000323D000-memory.dmp acprotect behavioral2/memory/1844-30-0x0000000003220000-0x000000000323D000-memory.dmp acprotect behavioral2/memory/1844-28-0x0000000003220000-0x000000000323D000-memory.dmp acprotect behavioral2/memory/1844-27-0x0000000003220000-0x000000000323D000-memory.dmp acprotect behavioral2/memory/3468-40-0x0000000002880000-0x000000000289D000-memory.dmp acprotect behavioral2/memory/3468-41-0x0000000010000000-0x000000001001C000-memory.dmp acprotect -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\com\comb.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\com\comb.dll svchost.exe File opened for modification C:\Windows\SysWOW64\Miscson.dll rundll32.exe File created C:\Windows\SysWOW64\scsimon.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\Miscson.dll svchost.exe File opened for modification C:\Windows\SysWOW64\scsimon.dll svchost.exe File created C:\Windows\SysWOW64\Miscson.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\scsimon.dll rundll32.exe File created C:\Windows\SysWOW64\Miscson.dll svchost.exe File created C:\Windows\SysWOW64\scsimon.dll svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3468 set thread context of 1844 3468 rundll32.exe 87 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\AppPatch\ComBack.Dll rundll32.exe File created C:\Windows\AppPatch\ComBack.Dll rundll32.exe File opened for modification C:\Windows\AppPatch\AcSvcst.dll rundll32.exe File created C:\Windows\AppPatch\AcSvcst.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1508 3468 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Spoolsv.exe -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" Spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices Spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" Spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" Spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices Spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices Spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" Spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3468 rundll32.exe Token: SeDebugPrivilege 1844 svchost.exe Token: SeDebugPrivilege 3468 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1572 wrote to memory of 3468 1572 rundll32.exe 84 PID 1572 wrote to memory of 3468 1572 rundll32.exe 84 PID 1572 wrote to memory of 3468 1572 rundll32.exe 84 PID 3468 wrote to memory of 1844 3468 rundll32.exe 87 PID 3468 wrote to memory of 1844 3468 rundll32.exe 87 PID 3468 wrote to memory of 1844 3468 rundll32.exe 87 PID 3468 wrote to memory of 1844 3468 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll,#12⤵
- Blocklisted process makes network request
- Boot or Logon Autostart Execution: Port Monitors
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k rundll323⤵
- Boot or Logon Autostart Execution: Port Monitors
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 6163⤵
- Program crash
PID:1508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3468 -ip 34681⤵PID:2784
-
C:\Windows\system32\Spoolsv.exeSpoolsv.exe1⤵PID:2740
-
C:\Windows\system32\Spoolsv.exeSpoolsv.exe1⤵
- Boot or Logon Autostart Execution: Port Monitors
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5f7ac9f2d26bf9688254171c81881020d
SHA1d6ef0fcdf531ddd3f5f81c68808acb3fc669fa23
SHA2566ba36cc739f9617c8b3ef487a04954884fb12b8edf682e6d7f08d9e1294ae708
SHA51236ef84428186a171d149e3664463bed85d7ab6eef2a54ed02deaa7ebe9128ecaa0084c25cd303ceec9e159200103a200f5bf667d97be0472cb795ac3a8ef2119
-
Filesize
137KB
MD51d044bf005206e2b0f591c7e54f9dc9e
SHA12f5f431ba1ae2b3c5c1bd562d489f53441344bf8
SHA256e49fab6c42d5afefb199c9c3bb0556e0fdbd611e70100d6381306275dbbc9aae
SHA512dc6f18d88e6dbee4342e48bd21ab66e4f2c3156959cb67358c3489c221399559dd3f8eef35fea1e30daa838b6f0c6ad0c6777251c704d63f06e01a4f81949ca7
-
Filesize
128B
MD5f1ffe71c0bdcbd07a61672713f6f9d73
SHA1a6e6b7fcc53bebd25a933333803fb60af64b7c76
SHA256749b186e82c4b411b56599614fb1d835e7fc63997efe86b16366c42176f475a5
SHA512d865254dfb00a4cccd9ef43eab24d65a9bf36247eace43314b5a078159ec8300c801ef47f70095fd1618fb3aa3a8a352e5d89fb30422e1cd2e64505d2faf2341
-
Filesize
247B
MD59227b22e3c51e71cbabc8b4a33738a30
SHA11a45435397c2b2042f6077cb1a7e338e3d51debf
SHA256c9397a1c4230924d92b682f3e017c6def59952c37cebb79a62b02767bffca0e0
SHA512f14dffe4bfcb3228e4894bf74193ef3f21648ca5c3f3a04a3fc484cb7f59086e0af84eb2245ca3b3da994cbe03d1b5cf7276045d7cffc99dc0cb8aff2d8e66e5
-
Filesize
290B
MD5607cbbf7c60c3ce3b0e425c5a8216111
SHA1f9a7de5a2e5d43685dc4b10f8e590eed1db9aafe
SHA256a56a96204a3c917e72d7a43618a5180c08c16908f999f795973bc3611a84626c
SHA5125536b26470360180e375e9cf00f6e1bc568325650077cc37f17be95543cd2ddcfa521803ba5a2bec019aeb04215637f41e4e35c0970636784871ef7cda36dbd9
-
Filesize
137KB
MD5d3f04077312e8e85323fd8cd44636fde
SHA19d7239040ee0e5dc8c509c70bc54e28cf7b94432
SHA256e632c61ab2a7e3c8863714589803f0393a9aca9d6c8d27c85cd8e417156b6599
SHA5121e59adebb2b56457f9ff25948f5acbfdac21eea1b23012b67dd9aa83268adab4cf036fb6e237a513b9a7e3951376a2248640cc391a62f207b145b3501bdc6cab