Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
f19e296a9ea4f4d69a67e7d851d9fc10de9bee232ea23bbbd3862a9436094de2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f19e296a9ea4f4d69a67e7d851d9fc10de9bee232ea23bbbd3862a9436094de2.dll
Resource
win10v2004-20220812-en
General
-
Target
f19e296a9ea4f4d69a67e7d851d9fc10de9bee232ea23bbbd3862a9436094de2.dll
-
Size
195KB
-
MD5
0e648490c903d23a7ba5bdaf9980a117
-
SHA1
b476cfae92d9b4bd36cabee4f377eb10d2a86eee
-
SHA256
f19e296a9ea4f4d69a67e7d851d9fc10de9bee232ea23bbbd3862a9436094de2
-
SHA512
67067c7137ebedf489dc93a5ec2091be82d90121176c84fb1a2c1a15edabdcd2b8ff609af82236245a076c2eb9e9a8310d5c86b624c60899f22861a24e287dc0
-
SSDEEP
3072:Bk3vXYXDr9wDUfoTnwwiJuLq4hZOqoLs28IJvJLizJlj+AtIDvthBW:BPXDr9IUfwBe4hVS4IZi+DT
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/628-56-0x0000000000210000-0x000000000021D000-memory.dmp upx behavioral1/memory/628-59-0x0000000000210000-0x000000000021D000-memory.dmp upx behavioral1/memory/628-60-0x0000000000210000-0x000000000021D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 960 wrote to memory of 628 960 rundll32.exe 27 PID 960 wrote to memory of 628 960 rundll32.exe 27 PID 960 wrote to memory of 628 960 rundll32.exe 27 PID 960 wrote to memory of 628 960 rundll32.exe 27 PID 960 wrote to memory of 628 960 rundll32.exe 27 PID 960 wrote to memory of 628 960 rundll32.exe 27 PID 960 wrote to memory of 628 960 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f19e296a9ea4f4d69a67e7d851d9fc10de9bee232ea23bbbd3862a9436094de2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f19e296a9ea4f4d69a67e7d851d9fc10de9bee232ea23bbbd3862a9436094de2.dll,#12⤵PID:628
-