Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll
Resource
win10v2004-20220901-en
General
-
Target
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll
-
Size
268KB
-
MD5
6351a9131a85dad788af5b3b04efbff7
-
SHA1
e8c88d8bf3b17ef32fa833ea2d3614571a71f56e
-
SHA256
8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804
-
SHA512
cf1c1befdef7feed81a9d5b79191b668c5ddf41bf1bbc8a325bd312cbd0a321d619326fb53689f2142e884522ab19201f207a8f6845299071aaed8055d8b8a33
-
SSDEEP
6144:nx2Kd1I7DkuX6WMqHtsoSViniktwHVUWoS2k6SCCr84ceKs76g42H6R2myeXI4sH:ncK7IEA6WGok5k6XofeKotXH6hBXI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Chiduhogajimono = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5008 rundll32.exe 5008 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5008 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 5008 1296 rundll32.exe 82 PID 1296 wrote to memory of 5008 1296 rundll32.exe 82 PID 1296 wrote to memory of 5008 1296 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8f7bba4cb928c3b995116a5b9a5e303f74061b86952727d29db1b43f98c27804.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5008
-