Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
92f117bebb5a80dbc94c5e4813ae22b83ee9eb616200cd221b5e83c905d3e93e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
92f117bebb5a80dbc94c5e4813ae22b83ee9eb616200cd221b5e83c905d3e93e.dll
Resource
win10v2004-20231215-en
General
-
Target
92f117bebb5a80dbc94c5e4813ae22b83ee9eb616200cd221b5e83c905d3e93e.dll
-
Size
397KB
-
MD5
9f445d3dfde1f07f4c424a153ca748db
-
SHA1
25615e143f060c85735a16dcc3c732130b15714a
-
SHA256
92f117bebb5a80dbc94c5e4813ae22b83ee9eb616200cd221b5e83c905d3e93e
-
SHA512
fafe1db22e89fc9fbaec80fdaeae53e7961e6532c35f2f9f54fa35540aea0f12d50d2031d63dfb661014f1d0c7a899311cd375a7a8207e53f903835f7072f453
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOaH:174g2LDeiPDImOkx2LIaH
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 23 1612 rundll32.exe 24 1612 rundll32.exe 31 1612 rundll32.exe 39 1612 rundll32.exe 41 1612 rundll32.exe 48 1612 rundll32.exe 62 1612 rundll32.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 223.5.5.5 Destination IP 114.114.114.114 -
Program crash 1 IoCs
pid pid_target Process procid_target 4632 1612 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1612 rundll32.exe Token: SeTcbPrivilege 1612 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1612 5020 rundll32.exe 88 PID 5020 wrote to memory of 1612 5020 rundll32.exe 88 PID 5020 wrote to memory of 1612 5020 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92f117bebb5a80dbc94c5e4813ae22b83ee9eb616200cd221b5e83c905d3e93e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\92f117bebb5a80dbc94c5e4813ae22b83ee9eb616200cd221b5e83c905d3e93e.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 7083⤵
- Program crash
PID:4632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1612 -ip 16121⤵PID:2884