Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 13:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
568ac0fe9170c5bb097114c8664228d5.dll
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
568ac0fe9170c5bb097114c8664228d5.dll
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
568ac0fe9170c5bb097114c8664228d5.dll
-
Size
244KB
-
MD5
568ac0fe9170c5bb097114c8664228d5
-
SHA1
88d9710ecdd9565b426015a972111a77481e4acb
-
SHA256
78bd820dd5e84b8aec79c345c7fb6763425988e3dcf0632870977bd408db0434
-
SHA512
2b744ed25f0378ecc5e470d9a844d4e834cba7161f7d53e7f2123c1dd6dc515094b260697519d84c7e90c25fe370ea86d82653a7ecfdbe0071e4b5193ddf3c9f
-
SSDEEP
3072:XVYiYIHUVsIPqiUQ78+Yo8VPfUNThDHbEbrfkNXmCjYxW/uC77sw5atjwwt:qNVsfQ7x0QDHhFkxWLL0w
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dwnrpofk = "{02DF19A7-018F-488D-B719-51E7A9DB32E9}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{02DF19A7-018F-488D-B719-51E7A9DB32E9}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{02DF19A7-018F-488D-B719-51E7A9DB32E9} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{02DF19A7-018F-488D-B719-51E7A9DB32E9}\InProcServer32\ = "C:\\Windows\\dwnrpofk.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2180 2360 rundll32.exe 28 PID 2360 wrote to memory of 2180 2360 rundll32.exe 28 PID 2360 wrote to memory of 2180 2360 rundll32.exe 28 PID 2360 wrote to memory of 2180 2360 rundll32.exe 28 PID 2360 wrote to memory of 2180 2360 rundll32.exe 28 PID 2360 wrote to memory of 2180 2360 rundll32.exe 28 PID 2360 wrote to memory of 2180 2360 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\568ac0fe9170c5bb097114c8664228d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\568ac0fe9170c5bb097114c8664228d5.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2180
-