Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 04:57
Behavioral task
behavioral1
Sample
8ca84bb70b2caf1b2f6045ad96915983dd32109493534571efd3f51cf5e67e14.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ca84bb70b2caf1b2f6045ad96915983dd32109493534571efd3f51cf5e67e14.dll
Resource
win10v2004-20240226-en
General
-
Target
8ca84bb70b2caf1b2f6045ad96915983dd32109493534571efd3f51cf5e67e14.dll
-
Size
51KB
-
MD5
3f78f6082996b2b268c1a96b5abd3625
-
SHA1
eee54f1f1efd579da7701a171a40c6c83b07272d
-
SHA256
8ca84bb70b2caf1b2f6045ad96915983dd32109493534571efd3f51cf5e67e14
-
SHA512
8ee526f77ebfb9274584a149c7f4692756743447270a753481c16c1d68c2932cd1b07e0e295d0b34b8f8162981ebeca1d69bbdb9c0771c00c7ecb0f8cc7d5f32
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL0JYH5:1dWubF3n9S91BF3fbo4JYH5
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2168 1692 rundll32.exe 28 PID 1692 wrote to memory of 2168 1692 rundll32.exe 28 PID 1692 wrote to memory of 2168 1692 rundll32.exe 28 PID 1692 wrote to memory of 2168 1692 rundll32.exe 28 PID 1692 wrote to memory of 2168 1692 rundll32.exe 28 PID 1692 wrote to memory of 2168 1692 rundll32.exe 28 PID 1692 wrote to memory of 2168 1692 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ca84bb70b2caf1b2f6045ad96915983dd32109493534571efd3f51cf5e67e14.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ca84bb70b2caf1b2f6045ad96915983dd32109493534571efd3f51cf5e67e14.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2168
-