Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
a8a194571bf39862d2ba7d72ccba235b05a3aab4d83570e527d0c34acda2bf74.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8a194571bf39862d2ba7d72ccba235b05a3aab4d83570e527d0c34acda2bf74.dll
Resource
win10v2004-20220812-en
General
-
Target
a8a194571bf39862d2ba7d72ccba235b05a3aab4d83570e527d0c34acda2bf74.dll
-
Size
126KB
-
MD5
9aee8f927a6402d1b50c75cb4463eb40
-
SHA1
76e538ffe4de64fab2cd23c848149f5dbbe903d6
-
SHA256
a8a194571bf39862d2ba7d72ccba235b05a3aab4d83570e527d0c34acda2bf74
-
SHA512
bbdd1ed0230a50a34d02f418f313af68edfaef40535db5dc87590bce3c200d55e00fe99c84273275689c31c94703ea16ef1d285ed7c67895253296a12ea4c9ee
-
SSDEEP
1536:GXWt3oWbAK/NFk7NTMRT+F/um7n9720ucCjtRXtJPyDP9IJ8WDF8X6n2h:GTWUshp+cm7n97HucotRXe5S8UOKS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1952-56-0x00000000001A0000-0x00000000001AE000-memory.dmp upx behavioral1/memory/1952-59-0x00000000001A0000-0x00000000001AE000-memory.dmp upx behavioral1/memory/1952-60-0x00000000001A0000-0x00000000001AE000-memory.dmp upx behavioral1/memory/1952-61-0x00000000001A0000-0x00000000001AE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1952 1908 rundll32.exe 28 PID 1908 wrote to memory of 1952 1908 rundll32.exe 28 PID 1908 wrote to memory of 1952 1908 rundll32.exe 28 PID 1908 wrote to memory of 1952 1908 rundll32.exe 28 PID 1908 wrote to memory of 1952 1908 rundll32.exe 28 PID 1908 wrote to memory of 1952 1908 rundll32.exe 28 PID 1908 wrote to memory of 1952 1908 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8a194571bf39862d2ba7d72ccba235b05a3aab4d83570e527d0c34acda2bf74.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8a194571bf39862d2ba7d72ccba235b05a3aab4d83570e527d0c34acda2bf74.dll,#12⤵PID:1952
-