Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
d6ca785e07590f4920e25faef868891379573a421deece9e74d9cb6bcfbd1a26N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6ca785e07590f4920e25faef868891379573a421deece9e74d9cb6bcfbd1a26N.dll
Resource
win10v2004-20240802-en
General
-
Target
d6ca785e07590f4920e25faef868891379573a421deece9e74d9cb6bcfbd1a26N.dll
-
Size
4KB
-
MD5
dabb73d61fa8ff7fbd3f4ec75edff470
-
SHA1
2426af70c07ce1990d9c5eaf3d7a5b215c12dc42
-
SHA256
d6ca785e07590f4920e25faef868891379573a421deece9e74d9cb6bcfbd1a26
-
SHA512
3f5f2bced579f05a866a4c589bb9de70b7061a39058b5eccd32b6ff6c96ef7bd3e4da26a4920b58dabb29e59d9a5b2e3f8be9a2a80322ba7e39ad719007c9d1e
-
SSDEEP
24:e1GSYTe3Cee/0I/kPVCRVtc44MnXz+iM2u8kypgyXwVQwA3H4tROjU9l9d6Kj6Ho:SWkO0IoyTnXz+ihZjokY9dydWpjV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2980 1956 rundll32.exe 29 PID 1956 wrote to memory of 2980 1956 rundll32.exe 29 PID 1956 wrote to memory of 2980 1956 rundll32.exe 29 PID 1956 wrote to memory of 2980 1956 rundll32.exe 29 PID 1956 wrote to memory of 2980 1956 rundll32.exe 29 PID 1956 wrote to memory of 2980 1956 rundll32.exe 29 PID 1956 wrote to memory of 2980 1956 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6ca785e07590f4920e25faef868891379573a421deece9e74d9cb6bcfbd1a26N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6ca785e07590f4920e25faef868891379573a421deece9e74d9cb6bcfbd1a26N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2980
-