Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    23s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 21:48 UTC

General

  • Target

    Plugins/32bit/WebNowPlaying.dll

  • Size

    1010KB

  • MD5

    3b08b5b7b215b63dede251abf9b19458

  • SHA1

    966ca23e137456dc92c4c9c9d51684aa84cab709

  • SHA256

    dc6b17894caa90a6e55a54993e04f24a49d4ab1d3f4f29e3b8d01a5d4d103125

  • SHA512

    75fd5f3586c2b245370bc3660a5f67c0b2d6a46d36a65ccb78d7ed42a2a4c63f3d670349a42f2d8c3598c8e0321108d90398ee3b522d3bde1cad2b13156e75bc

  • SSDEEP

    12288:Waf/z0Vb/sp68Wj7WG9nZ/7UulkQi6uSVT58T:Wgz0Vb/0Purr/hg6uSVT58

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Plugins\32bit\WebNowPlaying.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Plugins\32bit\WebNowPlaying.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 464
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1464-3-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/1464-6-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/3048-0-0x0000000002380000-0x00000000023C0000-memory.dmp

    Filesize

    256KB

  • memory/3048-1-0x00000000741E1000-0x00000000741E2000-memory.dmp

    Filesize

    4KB

  • memory/3048-2-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB

  • memory/3048-4-0x0000000002380000-0x00000000023C0000-memory.dmp

    Filesize

    256KB

  • memory/3048-5-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.