Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll
Resource
win10v2004-20220812-en
General
-
Target
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll
-
Size
27KB
-
MD5
13b19c443e6994ffdf287e3a6b591370
-
SHA1
cacad7c09953913152af3ded4dad2d42075c8b8a
-
SHA256
64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c
-
SHA512
db916b6a3cac5fdd87fb6fc2c48c233ca3941610d5ac2a6bdc9610e625463e730ed3cf938a4acc31d2dfc1da86b57c34f8eedfd6ba7f235ececdcee2148f944f
-
SSDEEP
384:1/yASy0m2N4tlJQNPi20Q/IdPc8zuPWSXabDOJBpbmXwkIvuwHjCYe:S0lJwPi5Q/IVZu+kVmf2e
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 7 2112 rundll32.exe 8 2112 rundll32.exe 9 2112 rundll32.exe 10 2112 rundll32.exe 11 2112 rundll32.exe 12 2112 rundll32.exe 13 2112 rundll32.exe 14 2112 rundll32.exe 15 2112 rundll32.exe 18 2112 rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4054384061\ImagePath = "\\systemroot\\4054384061" rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2112 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2112 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3580 wrote to memory of 2112 3580 rundll32.exe 79 PID 3580 wrote to memory of 2112 3580 rundll32.exe 79 PID 3580 wrote to memory of 2112 3580 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64573930ce1653e495ac7b4272113003e2d18badfdd0892c58f427bbac44820c.dll,#12⤵
- Blocklisted process makes network request
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2112
-