Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll
Resource
win10v2004-20230915-en
General
-
Target
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll
-
Size
74KB
-
MD5
60e8527b26fb0d5458664ec5c674338a
-
SHA1
034724e0211c1c988f4a48a51d5f2b433e73c455
-
SHA256
72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391
-
SHA512
cf0af30b547eb51b394a2096190652f8e82efd67813be1c553c630a5197c516a0f2ffa2a067a5817e7f18490cd781581edcf3376d73baa80f1a30314efc747b6
-
SSDEEP
1536:+pi13988ZAcYPxykieJBkugszIkRkAkkkp7kkkkZkiJ++9gL45+ZVYHvzf9fhsiC:+pi1398qAcYPxykieJBkugszIkRkAkk/
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 2560 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2720 2560 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2560 2392 rundll32.exe 28 PID 2392 wrote to memory of 2560 2392 rundll32.exe 28 PID 2392 wrote to memory of 2560 2392 rundll32.exe 28 PID 2392 wrote to memory of 2560 2392 rundll32.exe 28 PID 2392 wrote to memory of 2560 2392 rundll32.exe 28 PID 2392 wrote to memory of 2560 2392 rundll32.exe 28 PID 2392 wrote to memory of 2560 2392 rundll32.exe 28 PID 2560 wrote to memory of 2720 2560 rundll32.exe 29 PID 2560 wrote to memory of 2720 2560 rundll32.exe 29 PID 2560 wrote to memory of 2720 2560 rundll32.exe 29 PID 2560 wrote to memory of 2720 2560 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72ab1fdb6c8bb30e32ba8d3d27a1cea2690ad59ab4ff28bfd0ebfb3788555391.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 2483⤵
- Program crash
PID:2720
-
-