Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 10:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b5a399bbed8358f6052991b234b83201c9697afd28a5e7f8d7bc471fd64c4590.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b5a399bbed8358f6052991b234b83201c9697afd28a5e7f8d7bc471fd64c4590.dll
Resource
win10v2004-20230220-en
General
-
Target
b5a399bbed8358f6052991b234b83201c9697afd28a5e7f8d7bc471fd64c4590.dll
-
Size
220KB
-
MD5
33b67fc18f5cd5fffb39fb4911ea3931
-
SHA1
615dfe703858cdf566edd8f0a0d59a9a9ff20af4
-
SHA256
b5a399bbed8358f6052991b234b83201c9697afd28a5e7f8d7bc471fd64c4590
-
SHA512
841657c9d76ed12bc40ad012862f84b1c3a1915c3b27e7665512dc361ed9ad63b79ebed11921bebe4952b03f1233b866438afaef2fdc66b50fa0b544cfca69d4
-
SSDEEP
6144:tIIIIpzEtV8k+diK2+cEyecpAOGwvjECH:Lc8k+8KpfyFpMw7ECH
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2000 2160 rundll32.exe 84 PID 2160 wrote to memory of 2000 2160 rundll32.exe 84 PID 2160 wrote to memory of 2000 2160 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5a399bbed8358f6052991b234b83201c9697afd28a5e7f8d7bc471fd64c4590.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b5a399bbed8358f6052991b234b83201c9697afd28a5e7f8d7bc471fd64c4590.dll,#12⤵PID:2000
-
Network
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.77.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.36.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
322 B 7
-
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
260 B 5
-
322 B 7
-
260 B 5
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
2.77.109.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
2.36.159.162.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa