Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll
Resource
win10v2004-20231023-en
General
-
Target
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll
-
Size
952KB
-
MD5
af078c4997ef2244bdc3dbe809731890
-
SHA1
74028e8d04be0f824508814bc36addc6bb4e7cd6
-
SHA256
ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e
-
SHA512
7da33bc9f7f4065c65a96242e4471b8e56413a9625f253f93539eb365ee5fde873f7295b736c6b955b56c2b3fe90c5c0bad20f025c18aaa509081e54b67c0050
-
SSDEEP
24576:yYp2/iV8pXtdsmLkNPn2rbnRvZVhKspzhWOc:yHSy9oARnhKsp1
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 28 4704 rundll32.exe 32 4704 rundll32.exe 39 4704 rundll32.exe 53 4704 rundll32.exe 65 4704 rundll32.exe 70 4704 rundll32.exe -
Stops running service(s) 3 TTPs
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1764 sc.exe 1944 sc.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4704 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4704 4824 rundll32.exe 85 PID 4824 wrote to memory of 4704 4824 rundll32.exe 85 PID 4824 wrote to memory of 4704 4824 rundll32.exe 85 PID 4704 wrote to memory of 1088 4704 rundll32.exe 97 PID 4704 wrote to memory of 1088 4704 rundll32.exe 97 PID 4704 wrote to memory of 1088 4704 rundll32.exe 97 PID 1088 wrote to memory of 1764 1088 CMD.exe 99 PID 1088 wrote to memory of 1764 1088 CMD.exe 99 PID 1088 wrote to memory of 1764 1088 CMD.exe 99 PID 4704 wrote to memory of 4060 4704 rundll32.exe 101 PID 4704 wrote to memory of 4060 4704 rundll32.exe 101 PID 4704 wrote to memory of 4060 4704 rundll32.exe 101 PID 4060 wrote to memory of 1944 4060 CMD.exe 103 PID 4060 wrote to memory of 1944 4060 CMD.exe 103 PID 4060 wrote to memory of 1944 4060 CMD.exe 103
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad423f6907a939a34b036b0b71cffd09bea10e010edde21360bd8aceb4e1fc4e.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\CMD.exeCMD /C SC STOP3⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\sc.exeSC STOP4⤵
- Launches sc.exe
PID:1764
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C SC DELETE3⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\sc.exeSC DELETE4⤵
- Launches sc.exe
PID:1944
-
-
-