Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
c6a34e511ed1c7bb2ecddfaaba00992d53006db3ed4b5ab3da61943b417227e8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6a34e511ed1c7bb2ecddfaaba00992d53006db3ed4b5ab3da61943b417227e8.dll
Resource
win10v2004-20221111-en
General
-
Target
c6a34e511ed1c7bb2ecddfaaba00992d53006db3ed4b5ab3da61943b417227e8.dll
-
Size
63KB
-
MD5
011065d74db969042661caa6bd32dfeb
-
SHA1
54dd609c92019db916f8c2fbdf4531f2a588338a
-
SHA256
c6a34e511ed1c7bb2ecddfaaba00992d53006db3ed4b5ab3da61943b417227e8
-
SHA512
f207a736cd8954f138e77b91fd0fbd00556ff62efbec099472a93476716643750ca434ebb1531a207d01a126124eba9493fb8b631627507bf9b4a4e45e640665
-
SSDEEP
768:CF3f1rpqH7qaa+eblzhxxVu2rIWuBcD8ANv7Gax2Q7Q/b9PV0sbM:C9fZp1z+WDu2rCgVyU2QG0s
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 980 1964 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1964 1592 rundll32.exe 27 PID 1592 wrote to memory of 1964 1592 rundll32.exe 27 PID 1592 wrote to memory of 1964 1592 rundll32.exe 27 PID 1592 wrote to memory of 1964 1592 rundll32.exe 27 PID 1592 wrote to memory of 1964 1592 rundll32.exe 27 PID 1592 wrote to memory of 1964 1592 rundll32.exe 27 PID 1592 wrote to memory of 1964 1592 rundll32.exe 27 PID 1964 wrote to memory of 980 1964 rundll32.exe 28 PID 1964 wrote to memory of 980 1964 rundll32.exe 28 PID 1964 wrote to memory of 980 1964 rundll32.exe 28 PID 1964 wrote to memory of 980 1964 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6a34e511ed1c7bb2ecddfaaba00992d53006db3ed4b5ab3da61943b417227e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6a34e511ed1c7bb2ecddfaaba00992d53006db3ed4b5ab3da61943b417227e8.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2723⤵
- Program crash
PID:980
-
-