Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 02:10

General

  • Target

    3b9ef19463e18d96f9d65136b3a0a043.dll

  • Size

    32KB

  • MD5

    3b9ef19463e18d96f9d65136b3a0a043

  • SHA1

    24003bce8a175dd895875f7bfda28486e8e946e0

  • SHA256

    401ac3e612cdfbdbd08d8892e520b3d272d8dcf9ffda81d4413c3234329f15ab

  • SHA512

    54f2aa44c01c1c81d30476c8d86790ddaf342ae2516d90d02c6140119c7fdc3c8f8d3a59ab88430d5b4c6b19f8822f7cfff00f6f53d789f1a3d4cea253baa6a5

  • SSDEEP

    768:QXc/MaoE4Ec5maAVodZ2ubPg7QEuvTq7W0N:WcH4p4aAuP2oEu7qS0

Score
7/10

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3b9ef19463e18d96f9d65136b3a0a043.dll,#1
    1⤵
    • Modifies WinLogon
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 284
      2⤵
      • Program crash
      PID:1716
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3b9ef19463e18d96f9d65136b3a0a043.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2816-2-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/2816-1-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/2816-0-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/2816-3-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB