Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 00:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7e6ebc783b09d01889328a110d4629b7.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
7e6ebc783b09d01889328a110d4629b7.dll
-
Size
184KB
-
MD5
7e6ebc783b09d01889328a110d4629b7
-
SHA1
8838adcae0660bab5161c0099a10a52be633a727
-
SHA256
30b9a7a19b63a3334d82064a4e556ab142cf76761cc5a6c4586ca76ee968686b
-
SHA512
dd457adcafe70b03ad2d0366887bec65a1baef28d655a130422f2624dd6a3eeaa188b3dcd25710847f49df62cc091887d1001364320624305e5936091217fff4
-
SSDEEP
3072:Qhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JMVQcY:Q3fOeIv54W6SFKfc9me9v9/JMV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/1680-0-0x0000000074BB0000-0x0000000074BE0000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 1864 1680 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1680 3020 rundll32.exe 28 PID 3020 wrote to memory of 1680 3020 rundll32.exe 28 PID 3020 wrote to memory of 1680 3020 rundll32.exe 28 PID 3020 wrote to memory of 1680 3020 rundll32.exe 28 PID 3020 wrote to memory of 1680 3020 rundll32.exe 28 PID 3020 wrote to memory of 1680 3020 rundll32.exe 28 PID 3020 wrote to memory of 1680 3020 rundll32.exe 28 PID 1680 wrote to memory of 1864 1680 rundll32.exe 29 PID 1680 wrote to memory of 1864 1680 rundll32.exe 29 PID 1680 wrote to memory of 1864 1680 rundll32.exe 29 PID 1680 wrote to memory of 1864 1680 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e6ebc783b09d01889328a110d4629b7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7e6ebc783b09d01889328a110d4629b7.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 2803⤵
- Program crash
PID:1864
-
-