Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 17:04
Behavioral task
behavioral1
Sample
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll
Resource
win10v2004-20220812-en
General
-
Target
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll
-
Size
1.3MB
-
MD5
fd6524d388164ac9e454796177341d6a
-
SHA1
a81896aab990999cd9878ddbcc012d7a8343d212
-
SHA256
e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7
-
SHA512
7308b7f31901a80bea0a93c414a277f5f62d936f068e549d70e0f64eb21654958de9c2573cec22182c84b277e74d37ee6fb90581fe160bbdfc288820abe6cebc
-
SSDEEP
24576:XY4ixXpFM0HdAB7l3C0FZhmftqsC2MTD4IkYNYCM8Yl2WVpT1qJ42xLFaRTqFL8Q:IThpFKBWssCZNY2zM2GVqFr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5112-133-0x0000000010000000-0x0000000010394000-memory.dmp vmprotect behavioral2/memory/5112-137-0x0000000010000000-0x0000000010394000-memory.dmp vmprotect -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SkinH_EL.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\SkinH_EL.dll rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5112 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1456 wrote to memory of 5112 1456 rundll32.exe 79 PID 1456 wrote to memory of 5112 1456 rundll32.exe 79 PID 1456 wrote to memory of 5112 1456 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e58749e55749bdcab8ca2aaaa0980be3d5121963b86fa8c90d34708b6c28a0a7.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5112
-