Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/05/2024, 21:40

240531-1h99rafc28 8

31/05/2024, 18:30

240531-w5jcbshf38 8

31/05/2024, 18:28

240531-w4vc7she97 3

31/05/2024, 18:26

240531-w3l1fagf5s 8

Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    31/05/2024, 18:30

General

  • Target

    骑士精神2- 整个文件夹解压桌面打开/307.dll

  • Size

    45.5MB

  • MD5

    17a351a5d2fcdf9beae46bf17b8fd696

  • SHA1

    9ddb2fb630a87d00227170e1e6bbc534f8260df6

  • SHA256

    aefd0df2f84aabd659a363fa66910d683263d3faeb4e5cd58f63363dd1662de0

  • SHA512

    6adbd992bbf7284faf285445d55e61709e9f9e9939dd86ac78dad4d941bdf6f1702150bc7111a5f7637c9ecd9179bc883d4d2e9a7674710d4bae24e5f4cf157a

  • SSDEEP

    786432:BoMdRenWHSRTPyxn2JYH1LBpqCJvnPnljhVeWdaKN+mqpq+vyJmVq4:BoMdRenAwPy4WVFpLJvnvlNV1dzZ+vye

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\骑士精神2- 整个文件夹解压桌面打开\307.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\骑士精神2- 整个文件夹解压桌面打开\307.dll",#1
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3568
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
    1⤵
      PID:740

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3568-0-0x0000000010000000-0x0000000013CD2000-memory.dmp

      Filesize

      60.8MB

    • memory/3568-1-0x0000000004400000-0x000000000446B000-memory.dmp

      Filesize

      428KB

    • memory/3568-8-0x0000000004490000-0x0000000004491000-memory.dmp

      Filesize

      4KB

    • memory/3568-7-0x0000000004480000-0x0000000004481000-memory.dmp

      Filesize

      4KB

    • memory/3568-6-0x0000000004470000-0x0000000004471000-memory.dmp

      Filesize

      4KB

    • memory/3568-5-0x00000000776E4000-0x00000000776E5000-memory.dmp

      Filesize

      4KB

    • memory/3568-9-0x0000000010000000-0x0000000013CD2000-memory.dmp

      Filesize

      60.8MB