Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll
Resource
win10v2004-20220901-en
General
-
Target
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll
-
Size
186KB
-
MD5
15fb8831da5f9ca6782a46b082c75790
-
SHA1
e16b035304351c09484ad64e0f8ec2ae73d410ea
-
SHA256
58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44
-
SHA512
24fdd810873fc5c8969b63e17bee1764d64230342d671a19104138ac17d2b00fa35772d2e5cddd94f64862709f788256e52b8d8652343e7fd9fbad427e6ef1c7
-
SSDEEP
3072:fy2B3HXxcQzNXM040Nr5y1OztqdyUcAzBP2aHqEuO37EOxhSdMe524nl:frB3Hxzq040NrE1Ozt8yP8BVKry7E0MF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Gxofev = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 rundll32.exe 2012 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2012 1528 rundll32.exe 81 PID 1528 wrote to memory of 2012 1528 rundll32.exe 81 PID 1528 wrote to memory of 2012 1528 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\58efdf39656092c4af7c680706b1e8b15290b3152aab65cc9249b662321e3f44.dll,#12⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2012
-