Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 09:14
Behavioral task
behavioral1
Sample
e43838d2f7cffde86108b792e14697e062d4d15f4ca4afaa89ff96f11b12f621.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e43838d2f7cffde86108b792e14697e062d4d15f4ca4afaa89ff96f11b12f621.dll
Resource
win10v2004-20240412-en
General
-
Target
e43838d2f7cffde86108b792e14697e062d4d15f4ca4afaa89ff96f11b12f621.dll
-
Size
88KB
-
MD5
4ed2d36992bd1b13b6365b6300b2d685
-
SHA1
e08e07c63c32abb63d1e44f9e996a1089b6fb937
-
SHA256
e43838d2f7cffde86108b792e14697e062d4d15f4ca4afaa89ff96f11b12f621
-
SHA512
6cade0e19b62464d9a33fd37a0367ccd1d05ea119b67dfd7cf6bc851e7dac67dc974141d6f8f146af287e26e5c66348de48d47d527afb5b06675a236409c1753
-
SSDEEP
1536:AjUi4h6vmDpjmEu2rF0PthcQzAfi5cyZouK:KX4hJ5nrm1hLzai5cyZ
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 6 4808 rundll32.exe 58 4808 rundll32.exe 71 4808 rundll32.exe 86 4808 rundll32.exe 88 4808 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4808 3224 rundll32.exe 87 PID 3224 wrote to memory of 4808 3224 rundll32.exe 87 PID 3224 wrote to memory of 4808 3224 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e43838d2f7cffde86108b792e14697e062d4d15f4ca4afaa89ff96f11b12f621.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e43838d2f7cffde86108b792e14697e062d4d15f4ca4afaa89ff96f11b12f621.dll,#12⤵
- Blocklisted process makes network request
PID:4808
-