Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
301s -
max time network
400s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
b53e98ee4466352f646965570f782c0449954d91d43e49540180f435d75c5a18.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b53e98ee4466352f646965570f782c0449954d91d43e49540180f435d75c5a18.dll
Resource
win10v2004-20221111-en
General
-
Target
b53e98ee4466352f646965570f782c0449954d91d43e49540180f435d75c5a18.dll
-
Size
76KB
-
MD5
a2cd059e565581c6e2c585504b46e88c
-
SHA1
62878bad7759c3c506735b907234b2106173a3bd
-
SHA256
b53e98ee4466352f646965570f782c0449954d91d43e49540180f435d75c5a18
-
SHA512
02bb24c9b238c7fc93f15e597d5f19db0c54b6a11a5570e7e9e90a16554dd63a85565d2ea274de61791c768bfc5e504172f607dee5afd6a11335743f2f2c1592
-
SSDEEP
1536:Bx0Za0RQA5ksNcC/wZQLMHmZDPsbsAkR97NLMsaVwySbB9kMItjeSXnR:F0RZkUoZQLg6JdhLMsaVwFch
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3736-134-0x0000000010000000-0x0000000010025000-memory.dmp upx behavioral2/memory/3736-135-0x0000000010000000-0x0000000010025000-memory.dmp upx behavioral2/memory/3736-136-0x0000000010000000-0x0000000010025000-memory.dmp upx behavioral2/memory/3736-138-0x0000000010000000-0x0000000010025000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3736 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3736 4972 rundll32.exe 80 PID 4972 wrote to memory of 3736 4972 rundll32.exe 80 PID 4972 wrote to memory of 3736 4972 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b53e98ee4466352f646965570f782c0449954d91d43e49540180f435d75c5a18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b53e98ee4466352f646965570f782c0449954d91d43e49540180f435d75c5a18.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3736
-