Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 22:19
Behavioral task
behavioral1
Sample
50e448855e971762fcd6a7c0e46e622dc0a749416afb6e6113c62d6cb4fe4273.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50e448855e971762fcd6a7c0e46e622dc0a749416afb6e6113c62d6cb4fe4273.dll
Resource
win10v2004-20240226-en
General
-
Target
50e448855e971762fcd6a7c0e46e622dc0a749416afb6e6113c62d6cb4fe4273.dll
-
Size
76KB
-
MD5
582b69ec7eeb4ad8d77d6ca3ec2a1511
-
SHA1
4abdca720e5c256161d97c193230958bfc94b68f
-
SHA256
50e448855e971762fcd6a7c0e46e622dc0a749416afb6e6113c62d6cb4fe4273
-
SHA512
6d38d61e7214d2371ccec0d7cb0fbf47635a67d1eef088904fba4274cc154a03d6b40cc3b1d4e0dffc54e6ceb07f2e3662490caecb5f590bb1f71de9458c0d29
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZbPj:c8y93KQjy7G55riF1cMo03l
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/4612-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral2/memory/4612-1-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/4612-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4612-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4608 4612 WerFault.exe 88 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4612 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4612 1516 rundll32.exe 88 PID 1516 wrote to memory of 4612 1516 rundll32.exe 88 PID 1516 wrote to memory of 4612 1516 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50e448855e971762fcd6a7c0e46e622dc0a749416afb6e6113c62d6cb4fe4273.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50e448855e971762fcd6a7c0e46e622dc0a749416afb6e6113c62d6cb4fe4273.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 7003⤵
- Program crash
PID:4608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4612 -ip 46121⤵PID:1428