Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 23:48 UTC
Behavioral task
behavioral1
Sample
cadf0807b8666d645dc111ebc24df40f6c1068f6b6ff210b6747fd333a430a79.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cadf0807b8666d645dc111ebc24df40f6c1068f6b6ff210b6747fd333a430a79.dll
Resource
win10v2004-20230703-en
General
-
Target
cadf0807b8666d645dc111ebc24df40f6c1068f6b6ff210b6747fd333a430a79.dll
-
Size
51KB
-
MD5
f08396ac47ebfca6540d6334e4b7e350
-
SHA1
ca24d833958de36e3ef2fc5d9f6823acc355b1f2
-
SHA256
cadf0807b8666d645dc111ebc24df40f6c1068f6b6ff210b6747fd333a430a79
-
SHA512
6d1a581197c9ed7cfa8017c0c013b91231cf4b380e70253d1d12e7573399ac643a46e16e4a10616688ffb6fedd16cdcfcbc1c186e204a6665fedff1c7227395d
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLkJYH5:1dWubF3n9S91BF3fbo4JYH5
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2804 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2804 1432 rundll32.exe 81 PID 1432 wrote to memory of 2804 1432 rundll32.exe 81 PID 1432 wrote to memory of 2804 1432 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cadf0807b8666d645dc111ebc24df40f6c1068f6b6ff210b6747fd333a430a79.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cadf0807b8666d645dc111ebc24df40f6c1068f6b6ff210b6747fd333a430a79.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2804
-
Network
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.202.248.87.in-addr.arpaIN PTRResponse1.202.248.87.in-addr.arpaIN PTRhttps-87-248-202-1amsllnwnet
-
Remote address:8.8.8.8:53Request72.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request108.211.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request85.65.42.20.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
1.202.248.87.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
72.32.126.40.in-addr.arpa
-
74 B 145 B 1 1
DNS Request
108.211.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
85.65.42.20.in-addr.arpa