Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
90ea761777b3060c728afda59b86cd069f7afb81797789f3478ca6190cf75f8c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90ea761777b3060c728afda59b86cd069f7afb81797789f3478ca6190cf75f8c.dll
Resource
win10v2004-20221111-en
General
-
Target
90ea761777b3060c728afda59b86cd069f7afb81797789f3478ca6190cf75f8c.dll
-
Size
308KB
-
MD5
08cb3f3e0884e840c2effacf05db4277
-
SHA1
8710f6964e3740271cb91df29d61a2c7f3628ea2
-
SHA256
90ea761777b3060c728afda59b86cd069f7afb81797789f3478ca6190cf75f8c
-
SHA512
03a18e670853fc9eb73a7b850ed021aa0d441e77a83b241a9129ca38b9a38ef7ef57c880038cbdc31c7862a5bb5fd3ecc5b1a4b9972d83dd7d8057f33dd10189
-
SSDEEP
6144:nuVbBrce0ucRcrKVkWDDP66MG8VivKYbA3yQAHNmIckTk2ajpOTBcuLIA6c:EBeucRc8kkDyvV2oNAt1ckTk5jpOTquV
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1084 rundll32.exe 1084 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1084 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 836 wrote to memory of 1084 836 rundll32.exe 27 PID 836 wrote to memory of 1084 836 rundll32.exe 27 PID 836 wrote to memory of 1084 836 rundll32.exe 27 PID 836 wrote to memory of 1084 836 rundll32.exe 27 PID 836 wrote to memory of 1084 836 rundll32.exe 27 PID 836 wrote to memory of 1084 836 rundll32.exe 27 PID 836 wrote to memory of 1084 836 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90ea761777b3060c728afda59b86cd069f7afb81797789f3478ca6190cf75f8c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90ea761777b3060c728afda59b86cd069f7afb81797789f3478ca6190cf75f8c.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-