Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:20
Behavioral task
behavioral1
Sample
6e0b00a6d32aaa2108d0bba147ad372b.dll
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
6e0b00a6d32aaa2108d0bba147ad372b.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
6e0b00a6d32aaa2108d0bba147ad372b.dll
-
Size
515KB
-
MD5
6e0b00a6d32aaa2108d0bba147ad372b
-
SHA1
ae69432593455eacef788d78a115d5ffd8148547
-
SHA256
e0df086e5f36e0a5aeab7b725866eabf9972eb98947bc2a98d2d85946f494378
-
SHA512
2c52a315b5bc4cebd93e9af62602378db829f1b8ac9e9c6f55ec02bf90a659f6f3b5300662a7066b3255c39962f96490089f482d7fbf7d5e68fd870dee0de54e
-
SSDEEP
12288:0dpxVT+KXSqqscPoUnKyW5WsjgfI7x4horx7nfaZu6fNl:0d/LiqqsOoUnKhgqxxrx7uNl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1372-0-0x0000000010000000-0x0000000010143000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3636 wrote to memory of 1372 3636 rundll32.exe 16 PID 3636 wrote to memory of 1372 3636 rundll32.exe 16 PID 3636 wrote to memory of 1372 3636 rundll32.exe 16
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e0b00a6d32aaa2108d0bba147ad372b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6e0b00a6d32aaa2108d0bba147ad372b.dll,#12⤵PID:1372
-