Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
9c135d2f8f64fe1ed99baaa8c1543d776d89dca209bb2389ae0184c767495d34.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c135d2f8f64fe1ed99baaa8c1543d776d89dca209bb2389ae0184c767495d34.dll
Resource
win10v2004-20221111-en
General
-
Target
9c135d2f8f64fe1ed99baaa8c1543d776d89dca209bb2389ae0184c767495d34.dll
-
Size
270KB
-
MD5
03fed6711fff1ea2b61d69ed96810310
-
SHA1
4b2f03079455ba7e1d88bf20339450b78c719023
-
SHA256
9c135d2f8f64fe1ed99baaa8c1543d776d89dca209bb2389ae0184c767495d34
-
SHA512
a1d6878fb3c84b14143e42bc9c2452689d026f47a3b07beb580a39413a37f40a68ab9f5cb086fcbb0f4cf7733ab0e5c73a31ec37cce69a11deaa0933eaf0318e
-
SSDEEP
6144:l3zkKwiJaKY9wmgKkV9NtaolEY092oZVQMn9iR12zkmpRQzy:l3qiJanKKY9Wog2az8R1ktpY
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1900 1460 rundll32.exe 28 PID 1460 wrote to memory of 1900 1460 rundll32.exe 28 PID 1460 wrote to memory of 1900 1460 rundll32.exe 28 PID 1460 wrote to memory of 1900 1460 rundll32.exe 28 PID 1460 wrote to memory of 1900 1460 rundll32.exe 28 PID 1460 wrote to memory of 1900 1460 rundll32.exe 28 PID 1460 wrote to memory of 1900 1460 rundll32.exe 28 PID 1900 wrote to memory of 1120 1900 rundll32.exe 29 PID 1900 wrote to memory of 1120 1900 rundll32.exe 29 PID 1900 wrote to memory of 1120 1900 rundll32.exe 29 PID 1900 wrote to memory of 1120 1900 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c135d2f8f64fe1ed99baaa8c1543d776d89dca209bb2389ae0184c767495d34.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c135d2f8f64fe1ed99baaa8c1543d776d89dca209bb2389ae0184c767495d34.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:1120
-
-