Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 18:27
Behavioral task
behavioral1
Sample
c94e50739018f558c5deee2b1c0500fe.dll
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c94e50739018f558c5deee2b1c0500fe.dll
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
c94e50739018f558c5deee2b1c0500fe.dll
-
Size
216KB
-
MD5
c94e50739018f558c5deee2b1c0500fe
-
SHA1
42ac57071dd3ab5604bc4f4b9fb9498c326d0bf2
-
SHA256
39a2cedcde9c9d58ac7d408109414efbaf6a2ae76cdfd0e2f43298698762c55b
-
SHA512
14a603e35e389a36b35d8dbc439d4e1dac27fa0ae6aa88f0608ac1e1356cce15f08fa71bc2569d4e6749811bf9d2396be3acd2996be8b28d7b5dfbba89f3bd87
-
SSDEEP
384:BTW3UoNAgloeECwx7WkHrEOBRQOkbdLhzWXIE1vaI9FOP4cK:BvnLBYOkbdLd6vaI9Fz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3868-0-0x0000000010000000-0x0000000010010000-memory.dmp upx -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3868 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3868 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3868 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3868 2228 rundll32.exe 86 PID 2228 wrote to memory of 3868 2228 rundll32.exe 86 PID 2228 wrote to memory of 3868 2228 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c94e50739018f558c5deee2b1c0500fe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c94e50739018f558c5deee2b1c0500fe.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3868
-