Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
429b52194700375984c7a5a46891dd037292f643478d10ec7d9393611f022ada.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
429b52194700375984c7a5a46891dd037292f643478d10ec7d9393611f022ada.dll
Resource
win10v2004-20230915-en
General
-
Target
429b52194700375984c7a5a46891dd037292f643478d10ec7d9393611f022ada.dll
-
Size
808KB
-
MD5
62e5dd45f640592d499c3bd649155ea6
-
SHA1
c3fc76a3b16eebe9eb46e425aa2d703f9a690b0f
-
SHA256
429b52194700375984c7a5a46891dd037292f643478d10ec7d9393611f022ada
-
SHA512
19d73e0fbc198de200af927ca8d6c4b058ba65f32fe26b38da8e3789ce62a947a7149343dc669c9d63c9b05424517cc168ed05ea664334ac863076559a877c2a
-
SSDEEP
12288:+keL8xF5NyujYjHrWmtH77uuo3QsQ110qdrRodJAou33QzkYBf7a/CziwgHy:+keL3KmtH7Sb3Uv8JA5nQBBf7aqijS
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1648 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4800 4240 rundll32.exe 82 PID 4240 wrote to memory of 4800 4240 rundll32.exe 82 PID 4240 wrote to memory of 4800 4240 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\429b52194700375984c7a5a46891dd037292f643478d10ec7d9393611f022ada.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\429b52194700375984c7a5a46891dd037292f643478d10ec7d9393611f022ada.dll,#12⤵PID:4800
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4980
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648