Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    179s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 07:22

General

  • Target

    403e90548c39cc5bf905b871d1785093.dll

  • Size

    87KB

  • MD5

    403e90548c39cc5bf905b871d1785093

  • SHA1

    a2abd95a36c24a102c08d567cfc5c74421f52ed8

  • SHA256

    cb46de06215749a6f06eb788bfd1b9719042948abac72fa7de5abdfcd5c1541d

  • SHA512

    a1173ad6c057c13aa242db3cd2a55ead750e2cbb033bb9a8b5ae34e50bf94c4b3bfbb9678db1a2d4db8e7940830065c7d8dea33fcc9ade4e17acf8f9d36ff164

  • SSDEEP

    1536:hGersczqfU5DRmsZQSK6p6yS63tT4y1ktXN68bxw0K7m72Hz1:AersPchDQONS6+yC6ew0K7q2Hz1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\403e90548c39cc5bf905b871d1785093.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\403e90548c39cc5bf905b871d1785093.dll,#1
      2⤵
        PID:2396

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2396-1-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/2396-0-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/2396-2-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/2396-3-0x0000000000DA0000-0x0000000000DB4000-memory.dmp

      Filesize

      80KB

    • memory/2396-5-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/2396-4-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB