Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 23:10
Behavioral task
behavioral1
Sample
2233903a26463c28affc2ceb645a7220N.dll
Resource
win7-20240705-en
4 signatures
120 seconds
Behavioral task
behavioral2
Sample
2233903a26463c28affc2ceb645a7220N.dll
Resource
win10v2004-20240709-en
4 signatures
120 seconds
General
-
Target
2233903a26463c28affc2ceb645a7220N.dll
-
Size
203KB
-
MD5
2233903a26463c28affc2ceb645a7220
-
SHA1
5c4ea71ffcd8c944dfc5a6825ed56780119bdbb0
-
SHA256
4323fab59c07d44cb567c533e817fcfd1bc0b59ac8d00572a011986b5d1ebf6f
-
SHA512
49443860614fcbfa78cd200902efab9ebac73dafc123ddccd333121aa33adad841bfa11e12a2f5dd4c252d352dfbc2f452c81891e40718a3e9b5bfabc1c2160c
-
SSDEEP
3072:hJ8IMILmCa3yx6oFEdgVXnFYf7C9Ugfxm3Nep9viMIG1:0kmCaiEoFEd+FYOtxmdeviMIG1
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1916-0-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1916-1-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1916-2-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1916 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1916 2640 rundll32.exe 31 PID 2640 wrote to memory of 1916 2640 rundll32.exe 31 PID 2640 wrote to memory of 1916 2640 rundll32.exe 31 PID 2640 wrote to memory of 1916 2640 rundll32.exe 31 PID 2640 wrote to memory of 1916 2640 rundll32.exe 31 PID 2640 wrote to memory of 1916 2640 rundll32.exe 31 PID 2640 wrote to memory of 1916 2640 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2233903a26463c28affc2ceb645a7220N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2233903a26463c28affc2ceb645a7220N.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-