Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
cf91135a06b03dde641957657243c28c25b46bf7e88f805366baa238e061d067.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
cf91135a06b03dde641957657243c28c25b46bf7e88f805366baa238e061d067.dll
Resource
win10v2004-20231023-en
General
-
Target
cf91135a06b03dde641957657243c28c25b46bf7e88f805366baa238e061d067.dll
-
Size
11.2MB
-
MD5
b4f14121323d18d9af7cd83e3c09da11
-
SHA1
04ff7c5de4f3fb9407dc33f4161e53c4226a6fee
-
SHA256
cf91135a06b03dde641957657243c28c25b46bf7e88f805366baa238e061d067
-
SHA512
4380d8dfbc37205449a305634c170a5cdacf06b3ba8046a405f2269ada7e2e468e35375a3e96fb7b5445e2253951f568e7a27489143e7fd718f73bbeb32d2643
-
SSDEEP
196608:RDaKQ4J27fhboex+udPIGVvY1jAuisRZu0FrktUV5ipcJ7t1Nv8lMTk1YNQhpHmL:RDaKQ4I7ZbVx/d5VOAbszP+8ipcJql1P
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2592 1940 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1940 rundll32.exe 1940 rundll32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe 1940 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1940 1680 rundll32.exe 28 PID 1680 wrote to memory of 1940 1680 rundll32.exe 28 PID 1680 wrote to memory of 1940 1680 rundll32.exe 28 PID 1680 wrote to memory of 1940 1680 rundll32.exe 28 PID 1680 wrote to memory of 1940 1680 rundll32.exe 28 PID 1680 wrote to memory of 1940 1680 rundll32.exe 28 PID 1680 wrote to memory of 1940 1680 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf91135a06b03dde641957657243c28c25b46bf7e88f805366baa238e061d067.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf91135a06b03dde641957657243c28c25b46bf7e88f805366baa238e061d067.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 4043⤵
- Program crash
PID:2592
-
-