Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 22:50
Behavioral task
behavioral1
Sample
50c81d29f1594fd0919047b6c54333dd8f254c129ba05ddc466c14a506d2af46.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50c81d29f1594fd0919047b6c54333dd8f254c129ba05ddc466c14a506d2af46.dll
Resource
win10v2004-20220812-en
General
-
Target
50c81d29f1594fd0919047b6c54333dd8f254c129ba05ddc466c14a506d2af46.dll
-
Size
122KB
-
MD5
c01b645aa792d37b5b8d2415b478d3e4
-
SHA1
7c2cecb24fffd5ce47a9c7877bca862e2db7ab3b
-
SHA256
50c81d29f1594fd0919047b6c54333dd8f254c129ba05ddc466c14a506d2af46
-
SHA512
02ddafde44aca3e0cb87e56fab8b87a4a4bcbf89f7582d236c285f4c838e0cab5ba1bc3060c6945a2c4668359aea928b44b60b025995e9a7fdbacd6517d93f94
-
SSDEEP
3072:of9xHwm1PXBmXZFeA28pMGEdePl9dehiv80P80Cnp8d6F:wdwaWB28adeP/deUv80P80Ap8u
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0504A175-AF80-4c27-BECE-8730688C6427}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0504A175-AF80-4c27-BECE-8730688C6427}\stubpath rundll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{0504A175-AF80-4c27-BECE-8730688C6427} rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1000 2420 rundll32.exe 78 PID 2420 wrote to memory of 1000 2420 rundll32.exe 78 PID 2420 wrote to memory of 1000 2420 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50c81d29f1594fd0919047b6c54333dd8f254c129ba05ddc466c14a506d2af46.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50c81d29f1594fd0919047b6c54333dd8f254c129ba05ddc466c14a506d2af46.dll,#12⤵
- Modifies Installed Components in the registry
PID:1000
-