Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e10c48956844f06a0a4dd49ca339cd1.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e10c48956844f06a0a4dd49ca339cd1.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
0e10c48956844f06a0a4dd49ca339cd1.dll
-
Size
31KB
-
MD5
0e10c48956844f06a0a4dd49ca339cd1
-
SHA1
ecbd1da9d8706d2d390805a3f47f66f89989315b
-
SHA256
1abd3186cebc2476687979e7d35826ae0fd545bbcab61bfd6e523c83df3789f3
-
SHA512
3c8deea3f5e4238038276b1c0f94d989f08e1f768578379c13a592d4b4770fdf6d44ca4b88ba1d7f1c960e66abf0751dcf1c1d61da74a4fcb0c8f498ea25edcc
-
SSDEEP
768:mKXkdYAQqqnGbngkOZxl7ffxzuo7ificWSR6R5U4qauTB0TeX:mKXiNaGbgkuhfUo7i5Wq63eauTBo
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1252-1-0x0000000000210000-0x0000000000230000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1252 1736 rundll32.exe 14 PID 1736 wrote to memory of 1252 1736 rundll32.exe 14 PID 1736 wrote to memory of 1252 1736 rundll32.exe 14 PID 1736 wrote to memory of 1252 1736 rundll32.exe 14 PID 1736 wrote to memory of 1252 1736 rundll32.exe 14 PID 1736 wrote to memory of 1252 1736 rundll32.exe 14 PID 1736 wrote to memory of 1252 1736 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e10c48956844f06a0a4dd49ca339cd1.dll,#11⤵PID:1252
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e10c48956844f06a0a4dd49ca339cd1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1736