Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
182s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
df23b01773f363320ed1f21fed25e38f4b0a6c2a773661a74b3069e898ce8868.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df23b01773f363320ed1f21fed25e38f4b0a6c2a773661a74b3069e898ce8868.dll
Resource
win10v2004-20220812-en
General
-
Target
df23b01773f363320ed1f21fed25e38f4b0a6c2a773661a74b3069e898ce8868.dll
-
Size
547KB
-
MD5
a7df0a6127f772afe722b792a0fb1950
-
SHA1
bf19e47fa47b78cf79564dd21c28e837ce93c09b
-
SHA256
df23b01773f363320ed1f21fed25e38f4b0a6c2a773661a74b3069e898ce8868
-
SHA512
a552944b0457e4b41d3c1074d96ba479cd75eb7efcb7b6481bd982f9b8c5df7740b9acca50527069774586e5224947abf6438d6a1c9b902bbc0bfc2fa15f9a7a
-
SSDEEP
3072:7eY+W3sxUvkUYGvf7+0Dt0fCpEmoJnn5XL7W65/FtA8z5Z0:7kJOkuKm06tyn5X26rx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Temp = "Rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\df23b01773f363320ed1f21fed25e38f4b0a6c2a773661a74b3069e898ce8868.dll,NP_Initialize" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5060 rundll32.exe 5060 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5060 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 5060 4396 rundll32.exe 80 PID 4396 wrote to memory of 5060 4396 rundll32.exe 80 PID 4396 wrote to memory of 5060 4396 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df23b01773f363320ed1f21fed25e38f4b0a6c2a773661a74b3069e898ce8868.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df23b01773f363320ed1f21fed25e38f4b0a6c2a773661a74b3069e898ce8868.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5060
-