Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 19:21
Behavioral task
behavioral1
Sample
89ca250d2619627bae49ccdba08aa1e3a74c9e1d956ddd8dd965dfdd16200697.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89ca250d2619627bae49ccdba08aa1e3a74c9e1d956ddd8dd965dfdd16200697.dll
Resource
win10v2004-20240226-en
General
-
Target
89ca250d2619627bae49ccdba08aa1e3a74c9e1d956ddd8dd965dfdd16200697.dll
-
Size
51KB
-
MD5
d963dd2f1b97cf58cbbc01e0b21bf69a
-
SHA1
c0854f3acb2b4e431a5acd4f8aaf511a8ba02087
-
SHA256
89ca250d2619627bae49ccdba08aa1e3a74c9e1d956ddd8dd965dfdd16200697
-
SHA512
ede4743a978cc6731e58930b8174a623de816df07dd26308dd71b002612584ffbe50ac8a3c3ba3a1b28784f985880e40d131cad8a9e2dcc3516edba71a32917d
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL7JYH5:1dWubF3n9S91BF3fbovJYH5
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 640 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89ca250d2619627bae49ccdba08aa1e3a74c9e1d956ddd8dd965dfdd16200697.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89ca250d2619627bae49ccdba08aa1e3a74c9e1d956ddd8dd965dfdd16200697.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:640
-