Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
90fa29cc98be1d715df26d22079bdb8ce1d1fd3ce6a4efb39a4c192134e01020.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
90fa29cc98be1d715df26d22079bdb8ce1d1fd3ce6a4efb39a4c192134e01020.dll
Resource
win10v2004-20240226-en
General
-
Target
90fa29cc98be1d715df26d22079bdb8ce1d1fd3ce6a4efb39a4c192134e01020.dll
-
Size
54KB
-
MD5
f58e0dfb8f915fa5ce1b7ca50c46b51b
-
SHA1
9acb977f13fce7ec38275887ddbbc0f42532e907
-
SHA256
90fa29cc98be1d715df26d22079bdb8ce1d1fd3ce6a4efb39a4c192134e01020
-
SHA512
4ebab09c4319c4604e7dad00f669e572ecf79d9db74a1a6f6ad833ea4be2ce3ead1548196a9b15a052ad006af28afa2005bd5523b8215e1f51fce9671a73580d
-
SSDEEP
768:rC8sPHjgxRIO5h7Ji10Ed4WKn84n2ZePq+RTdFvnM+cmVqDj64Bj:ri/Mf7oiEdXKn84n2ad/vbcmVWjXBj
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveCoUpdate = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\cache\\logger\\FileCoAuth.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2864 2416 rundll32.exe 29 PID 2416 wrote to memory of 2864 2416 rundll32.exe 29 PID 2416 wrote to memory of 2864 2416 rundll32.exe 29 PID 2416 wrote to memory of 2864 2416 rundll32.exe 29 PID 2416 wrote to memory of 2864 2416 rundll32.exe 29 PID 2416 wrote to memory of 2864 2416 rundll32.exe 29 PID 2416 wrote to memory of 2864 2416 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90fa29cc98be1d715df26d22079bdb8ce1d1fd3ce6a4efb39a4c192134e01020.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\90fa29cc98be1d715df26d22079bdb8ce1d1fd3ce6a4efb39a4c192134e01020.dll,#12⤵
- Adds Run key to start application
PID:2864
-