Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
a06a1c62d21f354bb82d2f645a8dc5869ee40d5ec501845735541df1e62ce3d6.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a06a1c62d21f354bb82d2f645a8dc5869ee40d5ec501845735541df1e62ce3d6.dll
Resource
win10v2004-20240802-en
General
-
Target
a06a1c62d21f354bb82d2f645a8dc5869ee40d5ec501845735541df1e62ce3d6.dll
-
Size
25.7MB
-
MD5
fe808541f4d741477ca03107d32fff9d
-
SHA1
4a709e65aaa407e27a493d4ee1b366b32e2ca792
-
SHA256
a06a1c62d21f354bb82d2f645a8dc5869ee40d5ec501845735541df1e62ce3d6
-
SHA512
619cf053c31e12436d507ff1901a3f2dfcbfdff21d2f521913446d3701569c93bc3faa8593e7fdc9563f9fd73a83a34ec4653526cbdc9ea373fdfec57e68a7ee
-
SSDEEP
393216:WwDWT+VTKBElAY3e/+bbL3WyjPtfPDgqXH+IRpjhofUqcwQd:NVTXy8RbfWy7tfPDPH+Whgfc
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2068 rundll32.exe 2068 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2360 2068 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2068 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2068 3004 rundll32.exe 30 PID 3004 wrote to memory of 2068 3004 rundll32.exe 30 PID 3004 wrote to memory of 2068 3004 rundll32.exe 30 PID 3004 wrote to memory of 2068 3004 rundll32.exe 30 PID 3004 wrote to memory of 2068 3004 rundll32.exe 30 PID 3004 wrote to memory of 2068 3004 rundll32.exe 30 PID 3004 wrote to memory of 2068 3004 rundll32.exe 30 PID 2068 wrote to memory of 2360 2068 rundll32.exe 32 PID 2068 wrote to memory of 2360 2068 rundll32.exe 32 PID 2068 wrote to memory of 2360 2068 rundll32.exe 32 PID 2068 wrote to memory of 2360 2068 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a06a1c62d21f354bb82d2f645a8dc5869ee40d5ec501845735541df1e62ce3d6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a06a1c62d21f354bb82d2f645a8dc5869ee40d5ec501845735541df1e62ce3d6.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 3003⤵
- Program crash
PID:2360
-
-