Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 16:10
Behavioral task
behavioral1
Sample
444232e77933b5dede826550c278dec7b4d52c8c70e35aa14ae1adec903ecf12.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
444232e77933b5dede826550c278dec7b4d52c8c70e35aa14ae1adec903ecf12.dll
Resource
win10v2004-20231020-en
General
-
Target
444232e77933b5dede826550c278dec7b4d52c8c70e35aa14ae1adec903ecf12.dll
-
Size
51KB
-
MD5
1a3fd8d1e022cb70904a5874572fcb32
-
SHA1
ed2e047833f12bad7a4f457ee27140123bfabe3b
-
SHA256
444232e77933b5dede826550c278dec7b4d52c8c70e35aa14ae1adec903ecf12
-
SHA512
26c185ca6a4597c76442878a20387d71474d5011e6f0aa8c7764d696826d1c9ff6d5c655b5f3949113dab41c667debe07e3718a5401868e8e8533e01a6956db0
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL0JYH5:1dWubF3n9S91BF3fbowJYH5
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1860 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1860 1444 rundll32.exe 28 PID 1444 wrote to memory of 1860 1444 rundll32.exe 28 PID 1444 wrote to memory of 1860 1444 rundll32.exe 28 PID 1444 wrote to memory of 1860 1444 rundll32.exe 28 PID 1444 wrote to memory of 1860 1444 rundll32.exe 28 PID 1444 wrote to memory of 1860 1444 rundll32.exe 28 PID 1444 wrote to memory of 1860 1444 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\444232e77933b5dede826550c278dec7b4d52c8c70e35aa14ae1adec903ecf12.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\444232e77933b5dede826550c278dec7b4d52c8c70e35aa14ae1adec903ecf12.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1860
-