Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 13:10 UTC
Behavioral task
behavioral1
Sample
ee2b719136105a13987a1c6df381e9b56175cc885e235beedf17262a0c02a4eb.dll
Resource
win7-20220812-en
1 signatures
150 seconds
General
-
Target
ee2b719136105a13987a1c6df381e9b56175cc885e235beedf17262a0c02a4eb.dll
-
Size
62KB
-
MD5
60acaa03565d585f89c65bf33be466f1
-
SHA1
a05b025a4cef49fd60868df9ffbe8c693266437b
-
SHA256
ee2b719136105a13987a1c6df381e9b56175cc885e235beedf17262a0c02a4eb
-
SHA512
90ae635731b2fab34da1aceb1b3c84003dd012e541e779179e7103e65e269151280e355ef08944931a7f3558e2023e33b6828d664e02efb3947597357bb33a5a
-
SSDEEP
768:YWPchmlCDzO+3s5gz6N9QQv9CCmpZRY8T1XP9MiAOU6fMrNJbN1q8zv+qRx5ha5d:YoliqhWQACmHRY8T1lMiA7EOhqAvXbg
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 4248 1720 rundll32.exe 81 PID 1720 wrote to memory of 4248 1720 rundll32.exe 81 PID 1720 wrote to memory of 4248 1720 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee2b719136105a13987a1c6df381e9b56175cc885e235beedf17262a0c02a4eb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee2b719136105a13987a1c6df381e9b56175cc885e235beedf17262a0c02a4eb.dll,#12⤵PID:4248
-