Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 20:34
Behavioral task
behavioral1
Sample
65f907305a8d1ff8a64df87628e6312d.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
65f907305a8d1ff8a64df87628e6312d.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
65f907305a8d1ff8a64df87628e6312d.dll
-
Size
74KB
-
MD5
65f907305a8d1ff8a64df87628e6312d
-
SHA1
3cc941eb4e9a11d9a832a030029ff19c3f5fd8ea
-
SHA256
ecd3aa43b932f3bb37a7e17fbdee3ed820c1111e449749b2137b57f159144bfe
-
SHA512
9eccb0241a11ba7437ecf0644c077437faf40fc45ad5f57f23d49b01625dcfcfcb680426a23d3f9ad4ea3f94d4e2f92095148c1dfa152394e4a95cd8e1388a52
-
SSDEEP
1536:16pVH2ybQKySuRrlr3WnvK9R0+3wZKcFEg/OEm4e0YktwUMH6:JeQKysnvuJ3wocTmL4Jtf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3160-0-0x0000000002D70000-0x0000000002DA5000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3160 2100 rundll32.exe 85 PID 2100 wrote to memory of 3160 2100 rundll32.exe 85 PID 2100 wrote to memory of 3160 2100 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65f907305a8d1ff8a64df87628e6312d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65f907305a8d1ff8a64df87628e6312d.dll,#12⤵PID:3160
-