Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:26
Behavioral task
behavioral1
Sample
DNF-XHA V3.[2].0版(可单刷)/HA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
DNF-XHA V3.[2].0版(可单刷)/HA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
DNF-XHA V3.[2].0版(可单刷)/HAHook.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
DNF-XHA V3.[2].0版(可单刷)/HAHook.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
xin037.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
xin037.exe
Resource
win10v2004-20231215-en
General
-
Target
DNF-XHA V3.[2].0版(可单刷)/HAHook.dll
-
Size
61KB
-
MD5
409ec7aa3f50b936efa770a0995dc761
-
SHA1
d10e368bb8c67d7ae319b3c787d14d5256c045a9
-
SHA256
3cee0dbb2edb73360da75b830594e4a271157308b8a400c70f5ba150309022d9
-
SHA512
b4c7dac4d972d37597e7be4363c58aa85c7e79b4c5ddee2379a0340803eda40e0560216a4dff5aa526c062d99a4d47e3f3110910efefaa8c45ce53196bc70491
-
SSDEEP
1536:EkSotFjO0bll3QCQasjLH2WS75Hh7gYaDhIxNIpxG0dRXKYnouy81:EDebllYvWWSzsYGIKndR6Qout1
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/2772-0-0x0000000010000000-0x000000001002D000-memory.dmp upx behavioral3/memory/2772-2-0x0000000010000000-0x000000001002D000-memory.dmp upx behavioral3/memory/2772-1-0x0000000010000000-0x000000001002D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2172 2772 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2772 1820 rundll32.exe 28 PID 1820 wrote to memory of 2772 1820 rundll32.exe 28 PID 1820 wrote to memory of 2772 1820 rundll32.exe 28 PID 1820 wrote to memory of 2772 1820 rundll32.exe 28 PID 1820 wrote to memory of 2772 1820 rundll32.exe 28 PID 1820 wrote to memory of 2772 1820 rundll32.exe 28 PID 1820 wrote to memory of 2772 1820 rundll32.exe 28 PID 2772 wrote to memory of 2172 2772 rundll32.exe 29 PID 2772 wrote to memory of 2172 2772 rundll32.exe 29 PID 2772 wrote to memory of 2172 2772 rundll32.exe 29 PID 2772 wrote to memory of 2172 2772 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\DNF-XHA V3.[2].0版(可单刷)\HAHook.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\DNF-XHA V3.[2].0版(可单刷)\HAHook.dll",#12⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2323⤵
- Program crash
PID:2172
-
-