Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 02:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
00eb870477f3d9007c1ff885216219cc111ee9365f5e3d70f7bd37bd44910493.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
00eb870477f3d9007c1ff885216219cc111ee9365f5e3d70f7bd37bd44910493.dll
Resource
win10v2004-20230915-en
General
-
Target
00eb870477f3d9007c1ff885216219cc111ee9365f5e3d70f7bd37bd44910493.dll
-
Size
2.1MB
-
MD5
b3e65bbadc38a58915e4335fa0ec9442
-
SHA1
58ec2852ed48ee738810187e08e70acac47c9002
-
SHA256
00eb870477f3d9007c1ff885216219cc111ee9365f5e3d70f7bd37bd44910493
-
SHA512
e2d6c73c4ea9e26a743bd7b1c25cdda18f40686172b708506dadbfbda16d2e270b9e47f10974d2533e471bdf0708dab609818d779807bbb6828e05d4c34d29e9
-
SSDEEP
49152:vjz84B8m/mJoQAXJm5mEfZOkNPSTqctjRTDpJMMM:r7qm/eMcPPSTqsL5M
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1932 1528 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1528 2316 rundll32.exe 84 PID 2316 wrote to memory of 1528 2316 rundll32.exe 84 PID 2316 wrote to memory of 1528 2316 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00eb870477f3d9007c1ff885216219cc111ee9365f5e3d70f7bd37bd44910493.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00eb870477f3d9007c1ff885216219cc111ee9365f5e3d70f7bd37bd44910493.dll,#12⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 5603⤵
- Program crash
PID:1932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1528 -ip 15281⤵PID:4812
Network
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request54.120.234.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request8.3.197.209.in-addr.arpaIN PTRResponse8.3.197.209.in-addr.arpaIN PTRvip0x008map2sslhwcdnnet
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.202.248.87.in-addr.arpaIN PTRResponse1.202.248.87.in-addr.arpaIN PTRhttps-87-248-202-1amsllnwnet
-
Remote address:8.8.8.8:53Request137.71.105.51.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
54.120.234.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
70 B 111 B 1 1
DNS Request
8.3.197.209.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
1.202.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
137.71.105.51.in-addr.arpa