Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
68s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/07/2020, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
ylyz.dll
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ylyz.dll
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
ylyz.dll
-
Size
332KB
-
MD5
01fdd1c8cc5e5c69f3d5507a25367263
-
SHA1
eb992300f7fd49d3723737a39782bd4c46b4e566
-
SHA256
23843640cfae43671a48b17dc4fe585a8e37e3767039f82448077c5b54694a57
-
SHA512
97b70cca528e34cb4a18e884169364d07a407a78bd5b25c436612c0316a954e818e51fe3c50fe41197da9972cfd5f6c5d3d3a3921654967784837459ffb3dac8
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe 644 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3656 wrote to memory of 3768 3656 rundll32.exe 66 PID 3656 wrote to memory of 3768 3656 rundll32.exe 66 PID 3656 wrote to memory of 3768 3656 rundll32.exe 66 -
Program crash 1 IoCs
pid pid_target Process procid_target 644 3768 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 644 WerFault.exe Token: SeBackupPrivilege 644 WerFault.exe Token: SeDebugPrivilege 644 WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ylyz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ylyz.dll,#12⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 6163⤵
- Suspicious behavior: EnumeratesProcesses
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-