Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Valkyrie.exe
windows7-x64
1Valkyrie.exe
windows10-2004-x64
1WallHack.dll
windows7-x64
7WallHack.dll
windows10-2004-x64
7x64/msvcr100.dll
windows7-x64
1x64/msvcr100.dll
windows10-2004-x64
1x64/msvcr100d.dll
windows7-x64
1x64/msvcr100d.dll
windows10-2004-x64
1x86/msvcr100.dll
windows7-x64
3x86/msvcr100.dll
windows10-2004-x64
3x86/msvcr100d.dll
windows7-x64
3x86/msvcr100d.dll
windows10-2004-x64
3Analysis
-
max time kernel
125s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 09:38
Behavioral task
behavioral1
Sample
Valkyrie.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Valkyrie.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
WallHack.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
WallHack.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
x64/msvcr100.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
x64/msvcr100.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
x64/msvcr100d.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
x64/msvcr100d.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
x86/msvcr100.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
x86/msvcr100.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
x86/msvcr100d.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
x86/msvcr100d.dll
Resource
win10v2004-20240704-en
General
-
Target
x86/msvcr100d.dll
-
Size
1.4MB
-
MD5
b245bf00ba8c1196dbf8c2bd5dec9f60
-
SHA1
3090b2365ef1c3dbb378d309ee4b9aa811548e07
-
SHA256
80e8c0147f9960c8982092a4b43329835dc394036306bdd1a763bb59eb3d751b
-
SHA512
45b453c117fe3ae541eb9af0f8c7fff12dba4c83c95b6ab53027ba5650e44483738cbac34b2847b5830697c66d537dcbc54e76c0235ce7bfa3f9aacdfce685a3
-
SSDEEP
24576:7m/wTbJniLOB8QyruNelIQrTLGA1IZxvW6q9yNxsjcLO++yR6lPUoLpmLy4fAh:718QyruNwrXGAujvn84qcOvv
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3124 4176 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 368 wrote to memory of 4176 368 rundll32.exe 90 PID 368 wrote to memory of 4176 368 rundll32.exe 90 PID 368 wrote to memory of 4176 368 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\x86\msvcr100d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\x86\msvcr100d.dll,#12⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6003⤵
- Program crash
PID:3124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4176 -ip 41761⤵PID:4704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4440,i,2651612535745483053,7868876458147986089,262144 --variations-seed-version --mojo-platform-channel-handle=3868 /prefetch:81⤵PID:2224