Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
WinLockDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
WinLockDLL.dll
Resource
win10v2004-20231215-en
General
-
Target
WinLockDLL.dll
-
Size
774KB
-
MD5
6a62956f8d972bacbf8bf5548b24933c
-
SHA1
6a375a05e4a39d20da7d27a0b872753cac8c9bf8
-
SHA256
94e3dddf77fe2913f782afc87ef62bd1bbd852df7e1b4939e97878daac5c3f81
-
SHA512
09c96072bb3da7c78e5cae52218a95761f0be7e6561c5c5326b0f817a3c1cd8295a42c1ce593b6bf140db544f3890d0783f0fdb0f2b8bfc3506c8304967a914e
-
SSDEEP
12288:/EppL1elLrNXpTD0on/ULFO5U52BK+mTUR9jRnzPcbolO71mFZtzfw:/EDL1cXVxMLFOs2BK1IDRDmJ7EtzI
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Wine rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 320 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 320 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1684 wrote to memory of 320 1684 rundll32.exe 14 PID 1684 wrote to memory of 320 1684 rundll32.exe 14 PID 1684 wrote to memory of 320 1684 rundll32.exe 14 PID 1684 wrote to memory of 320 1684 rundll32.exe 14 PID 1684 wrote to memory of 320 1684 rundll32.exe 14 PID 1684 wrote to memory of 320 1684 rundll32.exe 14 PID 1684 wrote to memory of 320 1684 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WinLockDLL.dll,#11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:320
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\WinLockDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1684