Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
33c03c9a8298bf58368a9a3675534f60N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33c03c9a8298bf58368a9a3675534f60N.dll
Resource
win10v2004-20240802-en
General
-
Target
33c03c9a8298bf58368a9a3675534f60N.dll
-
Size
5KB
-
MD5
33c03c9a8298bf58368a9a3675534f60
-
SHA1
a992a141f0c82ff5a126f6b6f45de1d0627d9bae
-
SHA256
af569b80bc046ea2291430585d004684586351573ca9c90129e51fbf16b5e490
-
SHA512
e97bb1b3a10c6dd41ecd569e38554cb23d70db03282862c11c67e4c73aa46ed6cd4a6d71f5ead495c771741ad815d73bd3127a7e872c75e904f423278a4ee474
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEq8bkCrjAF/ghlYAe6LTnA+J451Fq/PdGd:hy859x0P8MaUW/gJN3A2dG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2200 3556 rundll32.exe 81 PID 3556 wrote to memory of 2200 3556 rundll32.exe 81 PID 3556 wrote to memory of 2200 3556 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33c03c9a8298bf58368a9a3675534f60N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33c03c9a8298bf58368a9a3675534f60N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2200
-