Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
204405b07d1f1a51fa400944173b6bfa.dll
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
204405b07d1f1a51fa400944173b6bfa.dll
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
204405b07d1f1a51fa400944173b6bfa.dll
-
Size
212KB
-
MD5
204405b07d1f1a51fa400944173b6bfa
-
SHA1
bbfde6f8814f2a24e80e42de0fa0e523cd805112
-
SHA256
23e84ec350ace5c7730ace7c71c5db7a8b9aaa8aae123056f4140a63eb979b6d
-
SHA512
5e1251748bc570480d4b653624da94e6231402c9f9e273f89c0351a933d974c8296a9b41e52a10da16a015af316b504899dab91a4784e0d53fa6134e19d2fd5e
-
SSDEEP
192:wG52Ii5CEWAKtNRbwt7m50niF033pgg0uYkoofFqH9Vd1S3ch2ZIXoegAjdxIkgy:wtWA6NytPiO6R+oa6Z1pQZIXgSv3+a
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2864 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2864 1180 rundll32.exe 28 PID 1180 wrote to memory of 2864 1180 rundll32.exe 28 PID 1180 wrote to memory of 2864 1180 rundll32.exe 28 PID 1180 wrote to memory of 2864 1180 rundll32.exe 28 PID 1180 wrote to memory of 2864 1180 rundll32.exe 28 PID 1180 wrote to memory of 2864 1180 rundll32.exe 28 PID 1180 wrote to memory of 2864 1180 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\204405b07d1f1a51fa400944173b6bfa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\204405b07d1f1a51fa400944173b6bfa.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2864
-