Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
c170f17069409eac894e594d540582ffcafc660722e28e0661ec445d9b90d05a.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c170f17069409eac894e594d540582ffcafc660722e28e0661ec445d9b90d05a.dll
Resource
win10v2004-20240802-en
General
-
Target
c170f17069409eac894e594d540582ffcafc660722e28e0661ec445d9b90d05a.dll
-
Size
1.9MB
-
MD5
3caac678e22c587908e2529cde33024d
-
SHA1
401594b7883ecbb8cc93349d4fe3cb753466341a
-
SHA256
c170f17069409eac894e594d540582ffcafc660722e28e0661ec445d9b90d05a
-
SHA512
0167e8742bcaa8c6bcc163b7fb331e519d968472073e85f8ac6a4d1a006de63257bf7560d2713536a7ec54229c6774f66eb58241058acb3f30237871b4efd617
-
SSDEEP
24576:mkm/ITi3EoMI2PepB/K2xBknI7YkziXaT0Fuq49DKva2D9bLdKpbMafSlm9jxAjB:m9X4q/vGWT+XBj9b2bMafS09jxAjfoM
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 33 4640 rundll32.exe 41 4640 rundll32.exe 43 4640 rundll32.exe 45 4640 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4640 4504 rundll32.exe 85 PID 4504 wrote to memory of 4640 4504 rundll32.exe 85 PID 4504 wrote to memory of 4640 4504 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c170f17069409eac894e594d540582ffcafc660722e28e0661ec445d9b90d05a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c170f17069409eac894e594d540582ffcafc660722e28e0661ec445d9b90d05a.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4640
-