Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
764373ec9c0392198c488b49fdfaae50N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
764373ec9c0392198c488b49fdfaae50N.dll
Resource
win10v2004-20240802-en
General
-
Target
764373ec9c0392198c488b49fdfaae50N.dll
-
Size
6KB
-
MD5
764373ec9c0392198c488b49fdfaae50
-
SHA1
919e38876ccf1a96ab12a05090be336e1d63ebd7
-
SHA256
ad7ec903e0771db67d351577f766d7a2aa6d548fd29fc82d4d1d4cb31e1d9eaa
-
SHA512
89aff9c88486bdef0e686dbeffeb57df422033ce42c814b18afd19a5741bb21d4d82101e7cdb0c89fa8d999e3aabf38acb84b03c97305d8af8fea9cf69d9cd3f
-
SSDEEP
48:6EQt5YVOSVVEPy+wEMmqiHNpU10BB+BDq9J5SV3DY:CSVVEPozmB73B+FqX5S1D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1900 wrote to memory of 244 1900 rundll32.exe 90 PID 1900 wrote to memory of 244 1900 rundll32.exe 90 PID 1900 wrote to memory of 244 1900 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\764373ec9c0392198c488b49fdfaae50N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\764373ec9c0392198c488b49fdfaae50N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3364,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4332 /prefetch:81⤵PID:1960