Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/05/2023, 15:51

230522-tasw6shd57 5

22/05/2023, 15:46

230522-s71slshd38 5

Analysis

  • max time kernel
    54s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/05/2023, 15:51

General

  • Target

    G_768916/DVolPro.dll

  • Size

    8.0MB

  • MD5

    30e1d0c1941167612a1da0bb79a03be8

  • SHA1

    705e76d20627f5b19d8c08cb7bcab0e04a962c8a

  • SHA256

    01fd9d0fefc8a123f59347eb48de14336d641b22440ba20b6724f506b0a892ad

  • SHA512

    8084e4e805e5b458d04e6e246a29b45478fde661c16a34a8f77846174b869e06df861b69a1c4a76b91c9e3c07842a21c0b21da7f9aa1e2952ec7b15a2886ad26

  • SSDEEP

    196608:MqwXvaXu8N9GEFH20R85wLIhiNz6aWSzJUovW:6AH2I8czN+tSzJxW

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\G_768916\DVolPro.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\G_768916\DVolPro.dll,#1
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 592
        3⤵
        • Program crash
        PID:4232

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3724-116-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/3724-117-0x0000000002640000-0x0000000002641000-memory.dmp

    Filesize

    4KB

  • memory/3724-118-0x00000000026B0000-0x00000000026B1000-memory.dmp

    Filesize

    4KB

  • memory/3724-119-0x00000000026C0000-0x00000000026C1000-memory.dmp

    Filesize

    4KB

  • memory/3724-120-0x0000000002920000-0x0000000002921000-memory.dmp

    Filesize

    4KB

  • memory/3724-121-0x0000000002930000-0x0000000002931000-memory.dmp

    Filesize

    4KB

  • memory/3724-122-0x0000000002940000-0x0000000002941000-memory.dmp

    Filesize

    4KB

  • memory/3724-123-0x0000000002950000-0x0000000002951000-memory.dmp

    Filesize

    4KB

  • memory/3724-124-0x0000000002960000-0x0000000002961000-memory.dmp

    Filesize

    4KB

  • memory/3724-125-0x0000000002970000-0x0000000002971000-memory.dmp

    Filesize

    4KB

  • memory/3724-126-0x0000000002980000-0x0000000002981000-memory.dmp

    Filesize

    4KB

  • memory/3724-127-0x0000000004240000-0x0000000004241000-memory.dmp

    Filesize

    4KB

  • memory/3724-128-0x0000000004250000-0x0000000004251000-memory.dmp

    Filesize

    4KB

  • memory/3724-129-0x0000000004260000-0x0000000004261000-memory.dmp

    Filesize

    4KB

  • memory/3724-130-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/3724-131-0x0000000004280000-0x0000000004281000-memory.dmp

    Filesize

    4KB

  • memory/3724-132-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/3724-133-0x00000000042A0000-0x00000000043BA000-memory.dmp

    Filesize

    1.1MB

  • memory/3724-137-0x00000000043D0000-0x00000000044F9000-memory.dmp

    Filesize

    1.2MB

  • memory/3724-142-0x00000000043D0000-0x00000000044F9000-memory.dmp

    Filesize

    1.2MB

  • memory/3724-143-0x00000000729D0000-0x0000000073800000-memory.dmp

    Filesize

    14.2MB