Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll
Resource
win10v2004-20220901-en
General
-
Target
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll
-
Size
186KB
-
MD5
15fb8831da5f9ca6782a46b082c75790
-
SHA1
e16b035304351c09484ad64e0f8ec2ae73d410ea
-
SHA256
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44
-
SHA512
24fdd810873fc5c8969b63e17bee1764d64230342d671a19104138ac17d2b00fa35772d2e5cddd94f64862709f788256e52b8d8652343e7fd9fbad427e6ef1c7
-
SSDEEP
3072:fy2B3HXxcQzNXM040Nr5y1OztqdyUcAzBP2aHqEuO37EOxhSdMe524nl:frB3Hxzq040NrE1Ozt8yP8BVKry7E0MF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Tnavidesu = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1168 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1168 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1168 1832 rundll32.exe 27 PID 1832 wrote to memory of 1168 1832 rundll32.exe 27 PID 1832 wrote to memory of 1168 1832 rundll32.exe 27 PID 1832 wrote to memory of 1168 1832 rundll32.exe 27 PID 1832 wrote to memory of 1168 1832 rundll32.exe 27 PID 1832 wrote to memory of 1168 1832 rundll32.exe 27 PID 1832 wrote to memory of 1168 1832 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1168
-