Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
3b9e671275ac25c170d5319b09f1048cf4f21ec53b6bd384902b708cecd43228.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b9e671275ac25c170d5319b09f1048cf4f21ec53b6bd384902b708cecd43228.dll
Resource
win10v2004-20220812-en
General
-
Target
3b9e671275ac25c170d5319b09f1048cf4f21ec53b6bd384902b708cecd43228.dll
-
Size
276KB
-
MD5
c19a3ff9feb4f103bdde799cead12bc0
-
SHA1
61f132c5a7f2ec2d085d523ecbe8a5d7f5b75f17
-
SHA256
3b9e671275ac25c170d5319b09f1048cf4f21ec53b6bd384902b708cecd43228
-
SHA512
bb1b25a9a30cda765679b5779ef530408331ff13985473e9f727e767d9dc9df5be9fc817e82bac07d059a2f1f15af7e1703a82724cee60332c632d10b3adb353
-
SSDEEP
6144:Jd12Noo+OqVtlQ5xm+adB7haG4+Rp5mIfAZhzErIJWRAV2juxH0/Zd:xoooTqfl6xmJ/q+RX1fgsSV2jdZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Skitene = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\3b9e671275ac25c170d5319b09f1048cf4f21ec53b6bd384902b708cecd43228.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2344 rundll32.exe 2344 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2344 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2344 1812 rundll32.exe 80 PID 1812 wrote to memory of 2344 1812 rundll32.exe 80 PID 1812 wrote to memory of 2344 1812 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b9e671275ac25c170d5319b09f1048cf4f21ec53b6bd384902b708cecd43228.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b9e671275ac25c170d5319b09f1048cf4f21ec53b6bd384902b708cecd43228.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2344
-