Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 19:06
Behavioral task
behavioral1
Sample
8eae3fe29f8bfd90dfa2f9e87eec5285741a8afc1154c296adea24899ef7ebad.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8eae3fe29f8bfd90dfa2f9e87eec5285741a8afc1154c296adea24899ef7ebad.dll
Resource
win10v2004-20240412-en
General
-
Target
8eae3fe29f8bfd90dfa2f9e87eec5285741a8afc1154c296adea24899ef7ebad.dll
-
Size
899KB
-
MD5
7c8e2e1180b453024f1f2663fd60cb3c
-
SHA1
a2daab4901f059b5d93e0ddf035173c859f59111
-
SHA256
8eae3fe29f8bfd90dfa2f9e87eec5285741a8afc1154c296adea24899ef7ebad
-
SHA512
f41dabf82128fdab85329ca99156a932391c08918680cbb263b3a61e672a2076f8034649279ce9d834673e83a531ac6c795ebc21fcf7f55bad7629776f137015
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXM:7wqd87VM
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4484 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4484 1268 rundll32.exe 83 PID 1268 wrote to memory of 4484 1268 rundll32.exe 83 PID 1268 wrote to memory of 4484 1268 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8eae3fe29f8bfd90dfa2f9e87eec5285741a8afc1154c296adea24899ef7ebad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8eae3fe29f8bfd90dfa2f9e87eec5285741a8afc1154c296adea24899ef7ebad.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4484
-