Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 12:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b839bb135e3607285fd75d88a81b685.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
8b839bb135e3607285fd75d88a81b685.dll
-
Size
184KB
-
MD5
8b839bb135e3607285fd75d88a81b685
-
SHA1
44c73771d612639ef6d24f7f666f51338c95a439
-
SHA256
735cc85ea368f4ed7f5331bb0d744e280bdee4f2bbf961239b3440106edc54a8
-
SHA512
fae210df4452af2610bceda1547c8ea09d8fe862bf081c88772c3a670e2a7de66fb238dc258a9a6cba34101b7f27ba48479a118b4d0eb8f0b4b4ff30f58fdac8
-
SSDEEP
3072:dgkQz1PuOprc+kq6VNOe3qbarVEpZlcbBacS9nOdgRdA4l:sPFkq6zOe5ilSanOCd
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
103.75.201.2:443
158.223.1.108:6225
165.22.28.242:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/1748-0-0x0000000074FE0000-0x0000000075010000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2844 1748 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1748 2452 rundll32.exe 28 PID 2452 wrote to memory of 1748 2452 rundll32.exe 28 PID 2452 wrote to memory of 1748 2452 rundll32.exe 28 PID 2452 wrote to memory of 1748 2452 rundll32.exe 28 PID 2452 wrote to memory of 1748 2452 rundll32.exe 28 PID 2452 wrote to memory of 1748 2452 rundll32.exe 28 PID 2452 wrote to memory of 1748 2452 rundll32.exe 28 PID 1748 wrote to memory of 2844 1748 rundll32.exe 29 PID 1748 wrote to memory of 2844 1748 rundll32.exe 29 PID 1748 wrote to memory of 2844 1748 rundll32.exe 29 PID 1748 wrote to memory of 2844 1748 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b839bb135e3607285fd75d88a81b685.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b839bb135e3607285fd75d88a81b685.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 2243⤵
- Program crash
PID:2844
-
-