Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
307s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll
Resource
win10v2004-20221111-en
General
-
Target
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll
-
Size
159KB
-
MD5
85b57c32bf0cc276bfcd20081ee0a21c
-
SHA1
4d3eb58b49f140dcd3504c790f502e546568b17a
-
SHA256
b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d
-
SHA512
c8334b8f719ce5c06b32551ce4a200698c245b106be837f52949c69fee2900e1c4213319e69cc1580ecdb9e4c2bbc3f7b07dcf678b1289db6c6c1b6e16a7bf11
-
SSDEEP
3072:zvKBqW2Ds3vjDzvFZCN77vgttSg8CqFjKnUH:N7vgWg8C9nG
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1916 1688 rundll32.exe 81 PID 1688 wrote to memory of 1916 1688 rundll32.exe 81 PID 1688 wrote to memory of 1916 1688 rundll32.exe 81 PID 1916 wrote to memory of 4888 1916 rundll32.exe 82 PID 1916 wrote to memory of 4888 1916 rundll32.exe 82 PID 1916 wrote to memory of 4888 1916 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6e3eb3bba1f8b4681a52420f292117adc0706d59949e4bddc4739528ca6395d.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" /ppiftsvc3⤵PID:4888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1916 -ip 19161⤵PID:2536