Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 04:28
Behavioral task
behavioral1
Sample
acaf3860288e5150e7a3f02ed70ce615180043ac099091817985e7865f5a12fc.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
acaf3860288e5150e7a3f02ed70ce615180043ac099091817985e7865f5a12fc.dll
Resource
win10v2004-20240412-en
General
-
Target
acaf3860288e5150e7a3f02ed70ce615180043ac099091817985e7865f5a12fc.dll
-
Size
899KB
-
MD5
ff0056c818b53a28e7a67b6a18536738
-
SHA1
dc6d22d7321fe65648e16879b4e692e59b407b34
-
SHA256
acaf3860288e5150e7a3f02ed70ce615180043ac099091817985e7865f5a12fc
-
SHA512
fe45b6a77e3300ca6e843820796f6d388107d9c8d4321f3c4b60748b8985f6e4295214fb2e6761c5776f261429b901064859e0d014ae0e7a69877d1f801c2093
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXQ:7wqd87VQ
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4392 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4392 2912 rundll32.exe 83 PID 2912 wrote to memory of 4392 2912 rundll32.exe 83 PID 2912 wrote to memory of 4392 2912 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acaf3860288e5150e7a3f02ed70ce615180043ac099091817985e7865f5a12fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acaf3860288e5150e7a3f02ed70ce615180043ac099091817985e7865f5a12fc.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4392
-