Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 03:31
Behavioral task
behavioral1
Sample
e3b4511f46f3ad580d894064d7605761a665beeef86dc6ab0f0f73e0352f1309.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3b4511f46f3ad580d894064d7605761a665beeef86dc6ab0f0f73e0352f1309.dll
Resource
win10v2004-20221111-en
General
-
Target
e3b4511f46f3ad580d894064d7605761a665beeef86dc6ab0f0f73e0352f1309.dll
-
Size
48KB
-
MD5
97ab04f059860928a5cc65882bb5fab0
-
SHA1
0ffbe9353e1ee1881b541fb80ca2aa64b1b8503c
-
SHA256
e3b4511f46f3ad580d894064d7605761a665beeef86dc6ab0f0f73e0352f1309
-
SHA512
21b8cc6ce1af38101a9033cc38dbc85c566929157c18477b71462308bac6e92bf6c56b1d7d38ee30b1df1e7ca56f4b2d0796c8a0579095e007d4c0d2632c48c4
-
SSDEEP
768:X/ZpdDvlWLR0+9Y/KGeP/Fj1p177uSvJU4glxcle8R2vST6sZ4DnbcuyD7U8E:X/ZLNWO+9Y/KGg7vJU4K7PDnouy88E
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1920-57-0x0000000000130000-0x000000000014E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1920 rundll32.exe 1972 svchost.exe 1972 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1920 rundll32.exe 1920 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1920 rundll32.exe Token: SeDebugPrivilege 1972 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1920 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1920 1760 rundll32.exe 28 PID 1760 wrote to memory of 1920 1760 rundll32.exe 28 PID 1760 wrote to memory of 1920 1760 rundll32.exe 28 PID 1760 wrote to memory of 1920 1760 rundll32.exe 28 PID 1760 wrote to memory of 1920 1760 rundll32.exe 28 PID 1760 wrote to memory of 1920 1760 rundll32.exe 28 PID 1760 wrote to memory of 1920 1760 rundll32.exe 28 PID 1920 wrote to memory of 1972 1920 rundll32.exe 29 PID 1920 wrote to memory of 1972 1920 rundll32.exe 29 PID 1920 wrote to memory of 1972 1920 rundll32.exe 29 PID 1920 wrote to memory of 1972 1920 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3b4511f46f3ad580d894064d7605761a665beeef86dc6ab0f0f73e0352f1309.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3b4511f46f3ad580d894064d7605761a665beeef86dc6ab0f0f73e0352f1309.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-