Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 23:46
Behavioral task
behavioral1
Sample
cb40c4faeed679e5d4bbb6a9786d5060N.dll
Resource
win7-20240704-en
5 signatures
120 seconds
General
-
Target
cb40c4faeed679e5d4bbb6a9786d5060N.dll
-
Size
76KB
-
MD5
cb40c4faeed679e5d4bbb6a9786d5060
-
SHA1
153927db8d7c1503dda3f9e2731b3727e1971451
-
SHA256
6ef839ef147f1d7ebb2a17ff2dff220ae530b99d180dca969e940be08b7afc95
-
SHA512
3727d0fc56145322d9afaee7d026d7f9ac711a3f3f4fe280b34c0c48de56c944586ee0d4e72d4630168cf71ae4dbf811fe0a328e613b84128a5a833c8a254984
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZwI54:c8y93KQjy7G55riF1cMo03k
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2096-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2096-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process 2680 2096 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2096 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2096 2368 rundll32.exe 30 PID 2368 wrote to memory of 2096 2368 rundll32.exe 30 PID 2368 wrote to memory of 2096 2368 rundll32.exe 30 PID 2368 wrote to memory of 2096 2368 rundll32.exe 30 PID 2368 wrote to memory of 2096 2368 rundll32.exe 30 PID 2368 wrote to memory of 2096 2368 rundll32.exe 30 PID 2368 wrote to memory of 2096 2368 rundll32.exe 30 PID 2096 wrote to memory of 2680 2096 rundll32.exe 31 PID 2096 wrote to memory of 2680 2096 rundll32.exe 31 PID 2096 wrote to memory of 2680 2096 rundll32.exe 31 PID 2096 wrote to memory of 2680 2096 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb40c4faeed679e5d4bbb6a9786d5060N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cb40c4faeed679e5d4bbb6a9786d5060N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 2323⤵
- Program crash
PID:2680
-
-