Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll
Resource
win10v2004-20231215-en
General
-
Target
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll
-
Size
972KB
-
MD5
f55abb1f306402f9c629c1fdbddd8624
-
SHA1
287284c71d2ca9fc8d78e1fbd39760d5568eed37
-
SHA256
ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0
-
SHA512
f60f4faa0d60f45fe8bb34f90605f5e1bb0925bded98cd01068177270f70574e32d693ee070270ddfb5502508b13aaa0cee9d41ae76076379207e47c92057238
-
SSDEEP
24576:OQ5nbDB2jtxYLHNnr+lNqn9EFPjeGGFpOHlKoAUvdtMbqBdrYhKspuC+7gMeI:PDB+txYLHNr+fF6bFpOHlKoAUvdtMbqY
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 13 1676 rundll32.exe 68 1676 rundll32.exe 103 1676 rundll32.exe 155 1676 rundll32.exe 173 1676 rundll32.exe 174 1676 rundll32.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1676 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4372 wrote to memory of 1676 4372 rundll32.exe 88 PID 4372 wrote to memory of 1676 4372 rundll32.exe 88 PID 4372 wrote to memory of 1676 4372 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ebd8e1f3db3f0bf0a0c0f5f7ab957f376dc66f5653c321a6e5755001beab1dd0.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of SetWindowsHookEx
PID:1676
-