Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
204405b07d1f1a51fa400944173b6bfa.dll
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
204405b07d1f1a51fa400944173b6bfa.dll
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
204405b07d1f1a51fa400944173b6bfa.dll
-
Size
212KB
-
MD5
204405b07d1f1a51fa400944173b6bfa
-
SHA1
bbfde6f8814f2a24e80e42de0fa0e523cd805112
-
SHA256
23e84ec350ace5c7730ace7c71c5db7a8b9aaa8aae123056f4140a63eb979b6d
-
SHA512
5e1251748bc570480d4b653624da94e6231402c9f9e273f89c0351a933d974c8296a9b41e52a10da16a015af316b504899dab91a4784e0d53fa6134e19d2fd5e
-
SSDEEP
192:wG52Ii5CEWAKtNRbwt7m50niF033pgg0uYkoofFqH9Vd1S3ch2ZIXoegAjdxIkgy:wtWA6NytPiO6R+oa6Z1pQZIXgSv3+a
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 620 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3092 wrote to memory of 620 3092 rundll32.exe 15 PID 3092 wrote to memory of 620 3092 rundll32.exe 15 PID 3092 wrote to memory of 620 3092 rundll32.exe 15
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\204405b07d1f1a51fa400944173b6bfa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\204405b07d1f1a51fa400944173b6bfa.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:620
-