Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 22:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a2d5a22d6814179a5d52fcf5e48b4ae7.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
a2d5a22d6814179a5d52fcf5e48b4ae7.dll
-
Size
184KB
-
MD5
a2d5a22d6814179a5d52fcf5e48b4ae7
-
SHA1
a01d40f229629de4ac15bc223579ac09a63293c6
-
SHA256
4a253a6d702edb0bd59424d642dc34746fb31c03949bcd0693ad9f30dd7f99fb
-
SHA512
0c323c4886b71800e9984e00aee12858a267fb1dcfd7624ecca8f5ee001391957ef7ee44d1bdfa7fb80ea2984a4901c410c27a58980a26bd09014640c0165198
-
SSDEEP
3072:mhd6lp2ffOeP3gv+i4W63iFfKfXM9mQltYwgO226+f33JgVQcY:m3fOeIv54W6SFKfc9me9v9/JgV
Malware Config
Extracted
Family
dridex
Botnet
22201
C2
51.79.50.122:443
222.124.142.67:10443
138.201.222.158:4664
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral1/memory/2024-0-0x0000000075200000-0x0000000075230000-memory.dmp dridex_ldr -
Program crash 1 IoCs
pid pid_target Process procid_target 2592 2024 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1524 wrote to memory of 2024 1524 rundll32.exe 28 PID 1524 wrote to memory of 2024 1524 rundll32.exe 28 PID 1524 wrote to memory of 2024 1524 rundll32.exe 28 PID 1524 wrote to memory of 2024 1524 rundll32.exe 28 PID 1524 wrote to memory of 2024 1524 rundll32.exe 28 PID 1524 wrote to memory of 2024 1524 rundll32.exe 28 PID 1524 wrote to memory of 2024 1524 rundll32.exe 28 PID 2024 wrote to memory of 2592 2024 rundll32.exe 29 PID 2024 wrote to memory of 2592 2024 rundll32.exe 29 PID 2024 wrote to memory of 2592 2024 rundll32.exe 29 PID 2024 wrote to memory of 2592 2024 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2d5a22d6814179a5d52fcf5e48b4ae7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2d5a22d6814179a5d52fcf5e48b4ae7.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 2883⤵
- Program crash
PID:2592
-
-