Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
c9f62cb73f972e7dd7ff77c1f2fdb933554acb42ebaf19615fe1ae9da87f3dd8.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c9f62cb73f972e7dd7ff77c1f2fdb933554acb42ebaf19615fe1ae9da87f3dd8.dll
Resource
win10v2004-20231222-en
General
-
Target
c9f62cb73f972e7dd7ff77c1f2fdb933554acb42ebaf19615fe1ae9da87f3dd8.dll
-
Size
397KB
-
MD5
24d25154c8393d3f6dae09fe6f82d04c
-
SHA1
b1be26f53630dcee020513730358f53e0631648c
-
SHA256
c9f62cb73f972e7dd7ff77c1f2fdb933554acb42ebaf19615fe1ae9da87f3dd8
-
SHA512
bf53536918b534bf7b0f001f0931de5e9da50255fcfbd246fb8785e9318c6c4a6e6b8987913f1fc1013eb4ae15deff087b378d2b6a9adabe68e0a21a386f7258
-
SSDEEP
6144:151sacsiu2LDeIHoMDIbGFtcEOkCybEaQRXr9HNdvOaY:174g2LDeiPDImOkx2LIaY
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe 4052 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4052 rundll32.exe Token: SeTcbPrivilege 4052 rundll32.exe Token: SeManageVolumePrivilege 4416 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4052 1280 rundll32.exe 89 PID 1280 wrote to memory of 4052 1280 rundll32.exe 89 PID 1280 wrote to memory of 4052 1280 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9f62cb73f972e7dd7ff77c1f2fdb933554acb42ebaf19615fe1ae9da87f3dd8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c9f62cb73f972e7dd7ff77c1f2fdb933554acb42ebaf19615fe1ae9da87f3dd8.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5000
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4416