Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
VIP Menu.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
VIP Menu.dll
Resource
win10v2004-20240704-en
General
-
Target
VIP Menu.dll
-
Size
140KB
-
MD5
8903f3d7bc38461335d2f11b696a2756
-
SHA1
e186d51a3784e24f9afb778c22183d333cbaca8b
-
SHA256
58f1473cc3568e07fc77d296023b8f7e316274ba0257d9e404f03c95e99f577e
-
SHA512
be0451ce102f83ef661afcc81b3309d33a87e034bb0c232f9176a11361402d0572005101cde362aa188381fbcbcee59a08465b3757ced96e26c00a80e7d60830
-
SSDEEP
3072:QZn9nZHScLVRVWrNm/eO1bI2Hivqzy9CgZ7VQeeaQeeQQeesQeeCqQeehQee7CK9:QnnZbVRkro/3I2HCVQeeaQeeQQeesQeS
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2004 736 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4164 wrote to memory of 736 4164 rundll32.exe 83 PID 4164 wrote to memory of 736 4164 rundll32.exe 83 PID 4164 wrote to memory of 736 4164 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\VIP Menu.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\VIP Menu.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 5723⤵
- Program crash
PID:2004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 736 -ip 7361⤵PID:3460