Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/08/2023, 03:40
Behavioral task
behavioral1
Sample
153e2cdc339fe42c47159b5e574f60f599e019ec42f0d98a529bfba96cf168c7.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
153e2cdc339fe42c47159b5e574f60f599e019ec42f0d98a529bfba96cf168c7.dll
Resource
win10v2004-20230703-en
General
-
Target
153e2cdc339fe42c47159b5e574f60f599e019ec42f0d98a529bfba96cf168c7.dll
-
Size
180KB
-
MD5
eaff6ef08156466b19628f81155d8ac8
-
SHA1
5dbbacc8db924eb72088d4a9956107f5fe773b74
-
SHA256
153e2cdc339fe42c47159b5e574f60f599e019ec42f0d98a529bfba96cf168c7
-
SHA512
7c4554ba68a49035b9c3eba81c15aff871d67091db4a6e96cfd4295ace11c186c4db1f5f5a74d80d356b15b2f8b1fe213c66e9de4c9fe0324c3c3b3147630ee3
-
SSDEEP
3072:R3V/I9QUy96czF3DGdCqflmb3yptTBfJsgMFwWyuW:R3mWUN2RDsCqNmbCptTBhsg+3W
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2216 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows\CurrentVersion\Run\ϵͳ×é¼þ = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2216 2000 rundll32.exe 28 PID 2000 wrote to memory of 2216 2000 rundll32.exe 28 PID 2000 wrote to memory of 2216 2000 rundll32.exe 28 PID 2000 wrote to memory of 2216 2000 rundll32.exe 28 PID 2000 wrote to memory of 2216 2000 rundll32.exe 28 PID 2000 wrote to memory of 2216 2000 rundll32.exe 28 PID 2000 wrote to memory of 2216 2000 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\153e2cdc339fe42c47159b5e574f60f599e019ec42f0d98a529bfba96cf168c7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\153e2cdc339fe42c47159b5e574f60f599e019ec42f0d98a529bfba96cf168c7.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2216
-