Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02/04/2024, 07:29 UTC

General

  • Target

    $PLUGINSDIR/olldmhffoaz.dll

  • Size

    22KB

  • MD5

    374e00e1b931d7e06c74d4ce9c9476a3

  • SHA1

    5f199903f9b64b10e218b4d98621f7c2b02b11d9

  • SHA256

    80f175c88444e4c1388bdc3560f9c44b9fb3a24861f20bbedab4b5dfd69d10ef

  • SHA512

    470793bc592c7ec78cc1dec91ebe48d6136c60d179512782b8b41532d372a8293c53913653931b3c74d1544fb038e1fc649cac745bd65310c1ffc88606350ad4

  • SSDEEP

    384:4nMclcY5oSkzLuF1L0hF2IQwAtTbGB1jMbo:4Mc+YSSkzLuFZkw9w+fGBZO

Score
10/10

Malware Config

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\olldmhffoaz.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\olldmhffoaz.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\olldmhffoaz.dll,#1
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:1920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1920-1-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1920-4-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1920-7-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1920-8-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2320-0-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

  • memory/2320-2-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.