Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 00:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
32e64320460b73080e8a5800079033a0N.dll
Resource
win7-20240708-en
1 signatures
120 seconds
Behavioral task
behavioral2
Sample
32e64320460b73080e8a5800079033a0N.dll
Resource
win10v2004-20240709-en
1 signatures
120 seconds
General
-
Target
32e64320460b73080e8a5800079033a0N.dll
-
Size
3KB
-
MD5
32e64320460b73080e8a5800079033a0
-
SHA1
e487a2ba93b3999b84d928304f3340406f063e53
-
SHA256
e298a9f2cad15cc2d006888249b7648e22f012d1f811030283e4a3016e7fa747
-
SHA512
31e172d70773f26e4801adc2c3e3fadc0acbd2c1355602ed2fa580d611888e883ac0cb5e491cb46f121640711a718f92cbfd582f59c1707592fc0eee469b2f77
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 184 4408 rundll32.exe 83 PID 4408 wrote to memory of 184 4408 rundll32.exe 83 PID 4408 wrote to memory of 184 4408 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32e64320460b73080e8a5800079033a0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\32e64320460b73080e8a5800079033a0N.dll,#12⤵PID:184
-