Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:25
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
1aa2f0fe7f49b3478986bcac3f7b1d93.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1aa2f0fe7f49b3478986bcac3f7b1d93.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
1aa2f0fe7f49b3478986bcac3f7b1d93.dll
-
Size
67KB
-
MD5
1aa2f0fe7f49b3478986bcac3f7b1d93
-
SHA1
0708ae6631821aa42856b27b3dbbc21d698a1376
-
SHA256
e9cacfe57a0f9b00df8881db4b974761ff6bcb90d74fcbd0dee7ad0397527458
-
SHA512
5dcb6468863a82ee2797a7aca905d2545d9c15933df824cb5f623472158cee4d4d3722dc9d016dbe5262d94c459f429d5693b4ffe81a874051e8a71006d9908b
-
SSDEEP
1536:e8anRzBPE+0prXqJnvT7LHOvK84FjIFjL+:7aRlPE+SrX+PbOvK19I9L+
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2276 840 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2020 wrote to memory of 840 2020 rundll32.exe 28 PID 2020 wrote to memory of 840 2020 rundll32.exe 28 PID 2020 wrote to memory of 840 2020 rundll32.exe 28 PID 2020 wrote to memory of 840 2020 rundll32.exe 28 PID 2020 wrote to memory of 840 2020 rundll32.exe 28 PID 2020 wrote to memory of 840 2020 rundll32.exe 28 PID 2020 wrote to memory of 840 2020 rundll32.exe 28 PID 840 wrote to memory of 2276 840 rundll32.exe 29 PID 840 wrote to memory of 2276 840 rundll32.exe 29 PID 840 wrote to memory of 2276 840 rundll32.exe 29 PID 840 wrote to memory of 2276 840 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1aa2f0fe7f49b3478986bcac3f7b1d93.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1aa2f0fe7f49b3478986bcac3f7b1d93.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 2283⤵
- Program crash
PID:2276
-
-