Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
25e7a624c9eb09610ad25616c1c7c798.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25e7a624c9eb09610ad25616c1c7c798.dll
Resource
win10v2004-20231222-en
General
-
Target
25e7a624c9eb09610ad25616c1c7c798.dll
-
Size
184KB
-
MD5
25e7a624c9eb09610ad25616c1c7c798
-
SHA1
2463ee1f21249045630ef91617c017fef8e363e1
-
SHA256
425f2a98152c333d3e19509080079a1d665a4452b8bfa3407f51c9fad7a9bd9e
-
SHA512
0fdec668f4e8d42f8b9ad82de3bac299f78f4d41f44dd3387ea40513468d62506dcb890c32a7e3e47494f2a516a8a60f3d7a9100e438c2d759c7dac1e8a2b98f
-
SSDEEP
3072:whd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JLVQcY:w3fOeIv54W6SFKfc9me9v9/JLV
Malware Config
Extracted
dridex
22201
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
Signatures
-
resource yara_rule behavioral1/memory/2764-0-0x0000000075010000-0x0000000075040000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2848 2764 WerFault.exe 14 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2764 2080 rundll32.exe 14 PID 2080 wrote to memory of 2764 2080 rundll32.exe 14 PID 2080 wrote to memory of 2764 2080 rundll32.exe 14 PID 2080 wrote to memory of 2764 2080 rundll32.exe 14 PID 2080 wrote to memory of 2764 2080 rundll32.exe 14 PID 2080 wrote to memory of 2764 2080 rundll32.exe 14 PID 2080 wrote to memory of 2764 2080 rundll32.exe 14 PID 2764 wrote to memory of 2848 2764 rundll32.exe 29 PID 2764 wrote to memory of 2848 2764 rundll32.exe 29 PID 2764 wrote to memory of 2848 2764 rundll32.exe 29 PID 2764 wrote to memory of 2848 2764 rundll32.exe 29
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25e7a624c9eb09610ad25616c1c7c798.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2882⤵
- Program crash
PID:2848
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25e7a624c9eb09610ad25616c1c7c798.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080