Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 04:59 UTC
Behavioral task
behavioral1
Sample
0250d7ab03d27076b35efa6b1a5dd0100651d120784fb53dce7a9ce4f6b3c809.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0250d7ab03d27076b35efa6b1a5dd0100651d120784fb53dce7a9ce4f6b3c809.dll
Resource
win10v2004-20240412-en
General
-
Target
0250d7ab03d27076b35efa6b1a5dd0100651d120784fb53dce7a9ce4f6b3c809.dll
-
Size
899KB
-
MD5
56844ebfac0d3edbbcd8edee50215ce2
-
SHA1
643ca58110c57450b30c48007325c546928b2671
-
SHA256
0250d7ab03d27076b35efa6b1a5dd0100651d120784fb53dce7a9ce4f6b3c809
-
SHA512
08e652e723601705cb999ba5984ddc80c5bd8cf175608bdb6a88e880c249722ef191b804a7147227fad0381a80ef8b324f1d1086b8594801dc93721fc921dd25
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX0:7wqd87V0
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 224 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 112 wrote to memory of 224 112 rundll32.exe 82 PID 112 wrote to memory of 224 112 rundll32.exe 82 PID 112 wrote to memory of 224 112 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0250d7ab03d27076b35efa6b1a5dd0100651d120784fb53dce7a9ce4f6b3c809.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0250d7ab03d27076b35efa6b1a5dd0100651d120784fb53dce7a9ce4f6b3c809.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:224
-
Network
-
Remote address:8.8.8.8:53Request67.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request25.24.18.2.in-addr.arpaIN PTRResponse25.24.18.2.in-addr.arpaIN PTRa2-18-24-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request21.114.53.23.in-addr.arpaIN PTRResponse21.114.53.23.in-addr.arpaIN PTRa23-53-114-21deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request100.58.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.24.18.2.in-addr.arpaIN PTRResponse18.24.18.2.in-addr.arpaIN PTRa2-18-24-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request8.167.79.40.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
67.31.126.40.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
25.24.18.2.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
21.114.53.23.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
100.58.20.217.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
18.24.18.2.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
8.167.79.40.in-addr.arpa