Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
fee8ebffaabbc907e8e02b9ff3dbd3406cd97f68336eb8104e90205dae94ba63.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fee8ebffaabbc907e8e02b9ff3dbd3406cd97f68336eb8104e90205dae94ba63.dll
Resource
win10v2004-20220812-en
General
-
Target
fee8ebffaabbc907e8e02b9ff3dbd3406cd97f68336eb8104e90205dae94ba63.dll
-
Size
752KB
-
MD5
1cd1fa99d01c3cd57db1b80f4a31a4b0
-
SHA1
e87bd2fc7db64b00b3331ff7f6c7abe256982b09
-
SHA256
fee8ebffaabbc907e8e02b9ff3dbd3406cd97f68336eb8104e90205dae94ba63
-
SHA512
2cf4afde76ada0c3d87f03c6c9f9389b65a765875228b143caac8affacacb1b96f31228eb8bf74a63d6a32b2fe7b752328fe90fb17acfb0584986d69aec0284f
-
SSDEEP
12288:nClaMNa0jNzhkmTpd+vBTIOHB+vikCl1dlk:nC4ANKmT3+ZT3HBkY1/k
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1424 rundll32.exe Token: 33 1424 rundll32.exe Token: SeIncBasePriorityPrivilege 1424 rundll32.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 1424 4084 rundll32.exe 80 PID 4084 wrote to memory of 1424 4084 rundll32.exe 80 PID 4084 wrote to memory of 1424 4084 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fee8ebffaabbc907e8e02b9ff3dbd3406cd97f68336eb8104e90205dae94ba63.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fee8ebffaabbc907e8e02b9ff3dbd3406cd97f68336eb8104e90205dae94ba63.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1424
-