Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:27
Behavioral task
behavioral1
Sample
5417ec491a49a26a619e4b3581308881.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5417ec491a49a26a619e4b3581308881.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
5417ec491a49a26a619e4b3581308881.dll
-
Size
10KB
-
MD5
5417ec491a49a26a619e4b3581308881
-
SHA1
399572fb5f8d07a165d7ce84f2a3f0e0beaddeaf
-
SHA256
4f5b8ad9c53986d1513531b0f91c2b35638b55e70c6ffee385ca6fe967edc982
-
SHA512
dd83bd4d750bd2c891d167d7e479bbb6cbc76f1805edd412594048567830f8a9790b4dfb9d43e1359f1c60c2dea10654ee31167c68c6d3198d906dc7d40be9e4
-
SSDEEP
192:Iq+bjrrYbl0qY7VkA0dNkyHHSOrMjT4aT0R3EmAWQW:IqRbVY7VkLX7MjTjWQW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4924-0-0x0000000010000000-0x000000001000B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4924 4112 rundll32.exe 88 PID 4112 wrote to memory of 4924 4112 rundll32.exe 88 PID 4112 wrote to memory of 4924 4112 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5417ec491a49a26a619e4b3581308881.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5417ec491a49a26a619e4b3581308881.dll,#12⤵PID:4924
-