Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 09:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ec1509dc8d42882c46d3aeedca6c02d34e08c3e1b2f0f540bff8ca97bb5cfc77.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ec1509dc8d42882c46d3aeedca6c02d34e08c3e1b2f0f540bff8ca97bb5cfc77.dll
Resource
win10v2004-20231215-en
General
-
Target
ec1509dc8d42882c46d3aeedca6c02d34e08c3e1b2f0f540bff8ca97bb5cfc77.dll
-
Size
2.2MB
-
MD5
d3c411786eb344ba899d972aae9ca2c9
-
SHA1
90b0ccacd06cfbda9d7d144290face671536844c
-
SHA256
ec1509dc8d42882c46d3aeedca6c02d34e08c3e1b2f0f540bff8ca97bb5cfc77
-
SHA512
7cc43169433fc0cf4f03bcbfa7fa96c421cd31f732bdde890ec17798a56dbc87c7a09d0d3dfaae71a9868411cfaf0adc8d34f5cd77f3ec305a4dea7ea95036e3
-
SSDEEP
49152:TJd0OM54ym/8RgJhYM97tQjFozL19wNa/WgI:VCOM5zyJcjFKp9JWgI
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1208 4520 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4520 5016 rundll32.exe 85 PID 5016 wrote to memory of 4520 5016 rundll32.exe 85 PID 5016 wrote to memory of 4520 5016 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec1509dc8d42882c46d3aeedca6c02d34e08c3e1b2f0f540bff8ca97bb5cfc77.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ec1509dc8d42882c46d3aeedca6c02d34e08c3e1b2f0f540bff8ca97bb5cfc77.dll,#12⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 5603⤵
- Program crash
PID:1208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4520 -ip 45201⤵PID:4904
Network
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request16.234.44.23.in-addr.arpaIN PTRResponse16.234.44.23.in-addr.arpaIN PTRa23-44-234-16deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request208.178.17.96.in-addr.arpaIN PTRResponse208.178.17.96.in-addr.arpaIN PTRa96-17-178-208deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request27.73.42.20.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
17.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
16.234.44.23.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
208.178.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
27.73.42.20.in-addr.arpa