Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
9d8a2cc2dd529767eea61abde4112f24f93c32303b10b649d84366d1310bd32f.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9d8a2cc2dd529767eea61abde4112f24f93c32303b10b649d84366d1310bd32f.dll
Resource
win10v2004-20231025-en
General
-
Target
9d8a2cc2dd529767eea61abde4112f24f93c32303b10b649d84366d1310bd32f.dll
-
Size
930KB
-
MD5
d8e5251e30a91b06addafce1d2871fd9
-
SHA1
34927bbdba82d2dc7d912ed7f01c87eb7a2cb866
-
SHA256
9d8a2cc2dd529767eea61abde4112f24f93c32303b10b649d84366d1310bd32f
-
SHA512
6d24bb8f95d0e7ea8f071f0ad5669177674e1ea90e8af87be18622f327246077d0ab2c20f26b55acf0e364a3b663a9e16fdb1fa48d85730cb50164dcaa78dbaf
-
SSDEEP
12288:iY4ucGNIsYTTtsFApjF4gnpImevEEEEEEEEEEEEEUEEEEEEEEEEEEEEEEEEEEEEx:NIsYXtsFApjF4gnpImXXm
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4868 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2140 4388 rundll32.exe 16 PID 4388 wrote to memory of 2140 4388 rundll32.exe 16 PID 4388 wrote to memory of 2140 4388 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d8a2cc2dd529767eea61abde4112f24f93c32303b10b649d84366d1310bd32f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d8a2cc2dd529767eea61abde4112f24f93c32303b10b649d84366d1310bd32f.dll,#12⤵PID:2140
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4868