Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24ee01b4285ffa2a4b17c5a3eb23e46b.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
24ee01b4285ffa2a4b17c5a3eb23e46b.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
24ee01b4285ffa2a4b17c5a3eb23e46b.dll
-
Size
86KB
-
MD5
24ee01b4285ffa2a4b17c5a3eb23e46b
-
SHA1
6ae0fb980dfb9afad484fc418942ae8b90b6a180
-
SHA256
8146ae6899da8e241b6c9443015eebda64e0e32c850205e0edf2a9bd8c3493e3
-
SHA512
69141a008c417bc6893e397ebd5b95485227a01fc539ae56cd5c3ab9099c126fe53a759124285ab322e8f3a18db76d6c0d9db15865fe1b7c232853718174f17f
-
SSDEEP
1536:w+3Qhim+2XZCAaEJwBvC1pqcP4NP9dSrQYI:x3QHbpEgwBvC1YcANEI
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2384 rundll32.exe 2384 rundll32.exe 2384 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2384 1864 rundll32.exe 28 PID 1864 wrote to memory of 2384 1864 rundll32.exe 28 PID 1864 wrote to memory of 2384 1864 rundll32.exe 28 PID 1864 wrote to memory of 2384 1864 rundll32.exe 28 PID 1864 wrote to memory of 2384 1864 rundll32.exe 28 PID 1864 wrote to memory of 2384 1864 rundll32.exe 28 PID 1864 wrote to memory of 2384 1864 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24ee01b4285ffa2a4b17c5a3eb23e46b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24ee01b4285ffa2a4b17c5a3eb23e46b.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2384
-