Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
10598e1af64...b1.dll
windows7-x64
10598e1af64...b1.dll
windows10-2004-x64
5092c344330...e0.dll
windows7-x64
1092c344330...e0.dll
windows10-2004-x64
5407eb23a1b...69.dll
windows7-x64
1407eb23a1b...69.dll
windows10-2004-x64
55671b3a89c...15.dll
windows7-x64
15671b3a89c...15.dll
windows10-2004-x64
1f270202cd8...a7.dll
windows7-x64
1f270202cd8...a7.dll
windows10-2004-x64
5Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
0598e1af6466b0813030d44fa64616eea7f83957d70f2f48376202c3179bd6b1.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0598e1af6466b0813030d44fa64616eea7f83957d70f2f48376202c3179bd6b1.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
092c344330bd5cba71377dead11946f7277f2dd4af57f5b636b70b343bc7ebe0.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
092c344330bd5cba71377dead11946f7277f2dd4af57f5b636b70b343bc7ebe0.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
407eb23a1b18efa17c38e9c0d914306c145a2b77b562d4e1077a823190434369.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
407eb23a1b18efa17c38e9c0d914306c145a2b77b562d4e1077a823190434369.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
5671b3a89c0e88a9bfb0bd5bc434fa5245578becfdeb284f4796f65eecbd6f15.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
5671b3a89c0e88a9bfb0bd5bc434fa5245578becfdeb284f4796f65eecbd6f15.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
f270202cd88b045630f6d2dec6d5823aa08aa66949b9ccd20f6e924c7992fea7.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
f270202cd88b045630f6d2dec6d5823aa08aa66949b9ccd20f6e924c7992fea7.dll
Resource
win10v2004-20230915-en
General
-
Target
f270202cd88b045630f6d2dec6d5823aa08aa66949b9ccd20f6e924c7992fea7.dll
-
Size
280KB
-
MD5
70c93643ff5171a362e05f41306f0c16
-
SHA1
b9d039157ed90a742b451eb26303dff9d5899d54
-
SHA256
f270202cd88b045630f6d2dec6d5823aa08aa66949b9ccd20f6e924c7992fea7
-
SHA512
e2a91befcf5c1a36a65c22e9006356e953692ae2589c49dbca0a0f42bc6ba39693ef878b0f46ac7798876d9bd7e4785a947d2b513635fb470184aceb590bb49d
-
SSDEEP
6144:Thtm8v2uUVUF7zn26P6zBPlTCcU1yhOIlzFdnqVX+28UcWt:Vtm4UiF7z2S69P9C1y7iVX+LWt
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 3460 2716 rundll32.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3460 WWAHost.exe 3460 WWAHost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 2716 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3460 WWAHost.exe Token: SeManageVolumePrivilege 3552 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3460 2716 rundll32.exe 87 PID 2716 wrote to memory of 3460 2716 rundll32.exe 87 PID 2716 wrote to memory of 3460 2716 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f270202cd88b045630f6d2dec6d5823aa08aa66949b9ccd20f6e924c7992fea7.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\WWAHost.exeC:\Windows\system32\WWAHost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3552