Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 15:10
Behavioral task
behavioral1
Sample
3eb216d2ebf01ac8023989c46ae1a77b.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3eb216d2ebf01ac8023989c46ae1a77b.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
3eb216d2ebf01ac8023989c46ae1a77b.dll
-
Size
185KB
-
MD5
3eb216d2ebf01ac8023989c46ae1a77b
-
SHA1
a2894b32ce95ddde399f839fbaf1a77876de321b
-
SHA256
3be4ec0c0b3a209f19208f2a27865a92352a4ccd69e07350cc8027a88d97ed95
-
SHA512
1d992be9321b13962a3077ea254a1031fbdbd5678e734c5c2ea8f5073170d961873fa6af39761435631fdff54bb0436878c287faee35e865b535d64b93e8d5ee
-
SSDEEP
3072:hzZFhBECT5NsBY7rhGya9wmpCs3rfbTTBftoNA5nQwbQoNsBY7rhGm:phBEClSBY/hGhWIrDTTBloNA5ngoSBYx
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 2316 2064 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2064 1960 rundll32.exe 15 PID 1960 wrote to memory of 2064 1960 rundll32.exe 15 PID 1960 wrote to memory of 2064 1960 rundll32.exe 15 PID 1960 wrote to memory of 2064 1960 rundll32.exe 15 PID 1960 wrote to memory of 2064 1960 rundll32.exe 15 PID 1960 wrote to memory of 2064 1960 rundll32.exe 15 PID 1960 wrote to memory of 2064 1960 rundll32.exe 15 PID 2064 wrote to memory of 2316 2064 rundll32.exe 14 PID 2064 wrote to memory of 2316 2064 rundll32.exe 14 PID 2064 wrote to memory of 2316 2064 rundll32.exe 14 PID 2064 wrote to memory of 2316 2064 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 2321⤵
- Program crash
PID:2316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3eb216d2ebf01ac8023989c46ae1a77b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2064
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3eb216d2ebf01ac8023989c46ae1a77b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1960