Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2022, 22:10 UTC

General

  • Target

    47c3642ffa359cb34c0e977b258bfd8ed73b1bda425679d35d8f41df953fc934.dll

  • Size

    22KB

  • MD5

    2d39379f5050b20f8364b0c69a5722f4

  • SHA1

    5e663df050739c68adb4b85a805f767d3507e101

  • SHA256

    47c3642ffa359cb34c0e977b258bfd8ed73b1bda425679d35d8f41df953fc934

  • SHA512

    9cb765cd386c1fe402862bf3431eae54a3ee34c112a9e0f2bdf41af9f384d6619e1f0da9fc88ffb7b097fc600370eba2bbeceacfa10998f5580d42a79bbe18c5

  • SSDEEP

    384:TeH+tWzlSDrb5+gIS3a2Oaa2pbNGJ38pPJv1TCAxAr6+S9Pfu7n5r:dtWurb6SOaVwYxv1TlxndeVr

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\47c3642ffa359cb34c0e977b258bfd8ed73b1bda425679d35d8f41df953fc934.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\47c3642ffa359cb34c0e977b258bfd8ed73b1bda425679d35d8f41df953fc934.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\SysWOW64\Wscript.exe
        Wscript.exe c:\windows\ime\vbs\pp.vbs
        3⤵
          PID:396

    Network

      No results found
    • 209.197.3.8:80
      322 B
      7
    • 93.184.221.240:80
      260 B
      5
    • 93.184.221.240:80
      260 B
      5
    • 20.189.173.14:443
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 8.247.210.126:80
      46 B
      40 B
      1
      1
    No results found

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1728-134-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.