Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 01:45
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
59f409d222249be2379628b3aff87421.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
59f409d222249be2379628b3aff87421.dll
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
59f409d222249be2379628b3aff87421.dll
-
Size
33KB
-
MD5
59f409d222249be2379628b3aff87421
-
SHA1
c3096e60a03b1166c6fa372ed77cab380c375fb4
-
SHA256
d9fc5358146b7c12551b29e5f8a7a942d51bda70ff97ed6ba7acff0ce0d89fb3
-
SHA512
be2687d01375ca4c640f3bf9b1129546a0f713ba03a686af832a466e9e77c74cf458ae7c56cf324b66377f19c58b005b77f4c6da0661c55ab8cfe1ee9c9837c7
-
SSDEEP
768:BOlc5QxBy/Zxkk8SWIu5yPLtSHxLVwrSPivMqdbBI:AC5gk/ZklD7RZYjv3d1I
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\klogini.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1520 1268 rundll32.exe 28 PID 1268 wrote to memory of 1520 1268 rundll32.exe 28 PID 1268 wrote to memory of 1520 1268 rundll32.exe 28 PID 1268 wrote to memory of 1520 1268 rundll32.exe 28 PID 1268 wrote to memory of 1520 1268 rundll32.exe 28 PID 1268 wrote to memory of 1520 1268 rundll32.exe 28 PID 1268 wrote to memory of 1520 1268 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59f409d222249be2379628b3aff87421.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\59f409d222249be2379628b3aff87421.dll,#12⤵
- Drops file in System32 directory
PID:1520
-