Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
96774df0e282ab2ffdb278f0f91ae656579b01a879039bea52c25b3468a9af3bN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96774df0e282ab2ffdb278f0f91ae656579b01a879039bea52c25b3468a9af3bN.dll
Resource
win10v2004-20240802-en
General
-
Target
96774df0e282ab2ffdb278f0f91ae656579b01a879039bea52c25b3468a9af3bN.dll
-
Size
6KB
-
MD5
2e4014f273428368dd27bcd6ee91c720
-
SHA1
99ccce3f5ece91a41b483098ae958626cc7ffa83
-
SHA256
96774df0e282ab2ffdb278f0f91ae656579b01a879039bea52c25b3468a9af3b
-
SHA512
52beccc9229fe4229b72b751c67c369986f4b4742cb3782184f08fe2e7634d226af46de15d71679129f1782b05a25e20db674aac6a0f5e1e3ee8cce1d7824a58
-
SSDEEP
96:DixZjmjtjd8jPjcZGR5TIA1bQSkmurkrDkWinphDgem+6LDBolyZJE6:unSR6bgYT1bQMOkrDkWipBgemXBo40
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3020 2032 rundll32.exe 30 PID 2032 wrote to memory of 3020 2032 rundll32.exe 30 PID 2032 wrote to memory of 3020 2032 rundll32.exe 30 PID 2032 wrote to memory of 3020 2032 rundll32.exe 30 PID 2032 wrote to memory of 3020 2032 rundll32.exe 30 PID 2032 wrote to memory of 3020 2032 rundll32.exe 30 PID 2032 wrote to memory of 3020 2032 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96774df0e282ab2ffdb278f0f91ae656579b01a879039bea52c25b3468a9af3bN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96774df0e282ab2ffdb278f0f91ae656579b01a879039bea52c25b3468a9af3bN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3020
-