Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
10/02/2022, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
nouactelegram.vmp.dll
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nouactelegram.vmp.dll
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
nouactelegram.vmp.dll
-
Size
5.5MB
-
MD5
52703c8091a4e3ac70d95c6acbf7dd0d
-
SHA1
671467744181cd12695db8e5ba1d79b0d83271c0
-
SHA256
02dfd5448fecf132e9c2062dce335945d220e7fd1a0ab0885ac20d409da02bbf
-
SHA512
ae54f063f36e13f6f04971b54dc19cb915a774dd0f35035c13ca61ce716515b9740695cae5035ff66bc5a44cf9c9d4979f21e5eab2409920cb0ec0fdb781bf90
Score
10/10
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1508-65-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
Blocklisted process makes network request 8 IoCs
flow pid Process 3 1508 rundll32.exe 5 1508 rundll32.exe 6 1508 rundll32.exe 7 1508 rundll32.exe 8 1508 rundll32.exe 9 1508 rundll32.exe 10 1508 rundll32.exe 11 1508 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1508 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1508 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 944 wrote to memory of 1508 944 rundll32.exe 27 PID 944 wrote to memory of 1508 944 rundll32.exe 27 PID 944 wrote to memory of 1508 944 rundll32.exe 27 PID 944 wrote to memory of 1508 944 rundll32.exe 27 PID 944 wrote to memory of 1508 944 rundll32.exe 27 PID 944 wrote to memory of 1508 944 rundll32.exe 27 PID 944 wrote to memory of 1508 944 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\nouactelegram.vmp.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\nouactelegram.vmp.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1508
-