Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
1bd1d397c5cf58d05962532b166ce5ea2c430bea5d520e2331c0ded2ec6ea6beN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bd1d397c5cf58d05962532b166ce5ea2c430bea5d520e2331c0ded2ec6ea6beN.dll
Resource
win10v2004-20240802-en
General
-
Target
1bd1d397c5cf58d05962532b166ce5ea2c430bea5d520e2331c0ded2ec6ea6beN.dll
-
Size
400KB
-
MD5
dfe87f544a934315c85f446c6bd73c50
-
SHA1
e8f55725901ea80292b377cd7a57442cb72ff26e
-
SHA256
1bd1d397c5cf58d05962532b166ce5ea2c430bea5d520e2331c0ded2ec6ea6be
-
SHA512
003fcfff2705cc65b42891a47d0e164e61562ceb2fe95152c3c4e23309aa1772fae54e35efb4a777f77f7ecc554fbcf9e89e8576b0667720b0642b5f73da8467
-
SSDEEP
6144:heGksMz1AMwFILbbOY6/fapGHioqs3SIGQ44o9XJ1+OB91Ztrf9mqJZvy:WX5GbPioB3mQBoZqw1dv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1632-1-0x0000000010000000-0x0000000010086000-memory.dmp upx behavioral1/memory/1632-4-0x0000000010000000-0x0000000010086000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1632 1320 rundll32.exe 31 PID 1320 wrote to memory of 1632 1320 rundll32.exe 31 PID 1320 wrote to memory of 1632 1320 rundll32.exe 31 PID 1320 wrote to memory of 1632 1320 rundll32.exe 31 PID 1320 wrote to memory of 1632 1320 rundll32.exe 31 PID 1320 wrote to memory of 1632 1320 rundll32.exe 31 PID 1320 wrote to memory of 1632 1320 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bd1d397c5cf58d05962532b166ce5ea2c430bea5d520e2331c0ded2ec6ea6beN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bd1d397c5cf58d05962532b166ce5ea2c430bea5d520e2331c0ded2ec6ea6beN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1632
-