Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
affd68b3c9fa435ff1cb63c097c3d583c0aca8f3390e3c7108ffdbfb78cc6907.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
affd68b3c9fa435ff1cb63c097c3d583c0aca8f3390e3c7108ffdbfb78cc6907.dll
Resource
win10v2004-20221111-en
General
-
Target
affd68b3c9fa435ff1cb63c097c3d583c0aca8f3390e3c7108ffdbfb78cc6907.dll
-
Size
20KB
-
MD5
51197d65e6362ff040cbfdebc6d5633f
-
SHA1
4df89e82f90bf66d5bf4d81728ff3296a2addf13
-
SHA256
affd68b3c9fa435ff1cb63c097c3d583c0aca8f3390e3c7108ffdbfb78cc6907
-
SHA512
c459a78bdf1193406e83c1f1a86c356ca3d0040d50205dec35af9360be50a67ae3cfbb00f9eb6c2e8461885d9113a7a117beaeebfb7c3ab249d72b4bad5f4fd9
-
SSDEEP
384:zSG/2Jp+C6QhtmruxCcdIL+0XplfCAu8UaWHuqaTlX0wG:zfYh2oCtpXPfx2OqaewG
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4292 rundll32.exe 4292 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4292 rundll32.exe 4292 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4292 4120 rundll32.exe 83 PID 4120 wrote to memory of 4292 4120 rundll32.exe 83 PID 4120 wrote to memory of 4292 4120 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\affd68b3c9fa435ff1cb63c097c3d583c0aca8f3390e3c7108ffdbfb78cc6907.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\affd68b3c9fa435ff1cb63c097c3d583c0aca8f3390e3c7108ffdbfb78cc6907.dll,#12⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD58f9d57c1bc9a4c1f9644bb18fe4db532
SHA152b48eab64c577602d665d25ee618a1cbdd9727f
SHA256cc48fdc83d54e9a3bf934a05a4174e9db7b14b4fa2916485e60ff886988a60ed
SHA512f5673c545a3f99aacd68fba67452406bddfa87e04c70de314ac80a40b8af7ab3828272092b15a48010dfbd334f6fc98f86c008e463bec37a743434e0eba116f1
-
Filesize
20KB
MD58f9d57c1bc9a4c1f9644bb18fe4db532
SHA152b48eab64c577602d665d25ee618a1cbdd9727f
SHA256cc48fdc83d54e9a3bf934a05a4174e9db7b14b4fa2916485e60ff886988a60ed
SHA512f5673c545a3f99aacd68fba67452406bddfa87e04c70de314ac80a40b8af7ab3828272092b15a48010dfbd334f6fc98f86c008e463bec37a743434e0eba116f1