Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/12/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll
Resource
win10v2004-20231215-en
General
-
Target
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll
-
Size
972KB
-
MD5
f55abb1f306402f9c629c1fdbddd8624
-
SHA1
287284c71d2ca9fc8d78e1fbd39760d5568eed37
-
SHA256
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0
-
SHA512
f60f4faa0d60f45fe8bb34f90605f5e1bb0925bded98cd01068177270f70574e32d693ee070270ddfb5502508b13aaa0cee9d41ae76076379207e47c92057238
-
SSDEEP
24576:OQ5nbDB2jtxYLHNnr+lNqn9EFPjeGGFpOHlKoAUvdtMbqBdrYhKspuC+7gMeI:PDB+txYLHNr+fF6bFpOHlKoAUvdtMbqY
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 3 2060 rundll32.exe 7 2060 rundll32.exe 8 2060 rundll32.exe 9 2060 rundll32.exe 10 2060 rundll32.exe 11 2060 rundll32.exe 12 2060 rundll32.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 480 Process not Found 480 Process not Found 480 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2060 1448 rundll32.exe 28 PID 1448 wrote to memory of 2060 1448 rundll32.exe 28 PID 1448 wrote to memory of 2060 1448 rundll32.exe 28 PID 1448 wrote to memory of 2060 1448 rundll32.exe 28 PID 1448 wrote to memory of 2060 1448 rundll32.exe 28 PID 1448 wrote to memory of 2060 1448 rundll32.exe 28 PID 1448 wrote to memory of 2060 1448 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:2060
-