Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 22:59
Behavioral task
behavioral1
Sample
cbd49cb770664ae96a985564e06866b10cee5923fc9385452b00fabffde2c890.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbd49cb770664ae96a985564e06866b10cee5923fc9385452b00fabffde2c890.dll
Resource
win10v2004-20240412-en
General
-
Target
cbd49cb770664ae96a985564e06866b10cee5923fc9385452b00fabffde2c890.dll
-
Size
51KB
-
MD5
7277b73ff8826807d6b582d9decf0808
-
SHA1
f6077707af54618b2ca5a27dacacf5b6cd85bc32
-
SHA256
cbd49cb770664ae96a985564e06866b10cee5923fc9385452b00fabffde2c890
-
SHA512
64922d7a9a3832e2e8352101f9ac90a7e9b3c5423e8c8939aab81dd6711a165c36822d68c7eca99d5aac1b9d97de865d1a2d64cd16541b4191ad8b2a8ce5e5ab
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLFJYH5:1dWubF3n9S91BF3fbopJYH5
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3016 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 3016 1600 rundll32.exe 84 PID 1600 wrote to memory of 3016 1600 rundll32.exe 84 PID 1600 wrote to memory of 3016 1600 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbd49cb770664ae96a985564e06866b10cee5923fc9385452b00fabffde2c890.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbd49cb770664ae96a985564e06866b10cee5923fc9385452b00fabffde2c890.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3016
-