Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
0cc517077b656996b8073d473fc8c8232ab0c05f1a2d2a469f9b29373bcba2f0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cc517077b656996b8073d473fc8c8232ab0c05f1a2d2a469f9b29373bcba2f0N.dll
Resource
win10v2004-20240802-en
General
-
Target
0cc517077b656996b8073d473fc8c8232ab0c05f1a2d2a469f9b29373bcba2f0N.dll
-
Size
4KB
-
MD5
f7602aae2154a36a7586045747c9c2c0
-
SHA1
21a5bd0765695409d76b4d5aaa737d16a4aa007e
-
SHA256
0cc517077b656996b8073d473fc8c8232ab0c05f1a2d2a469f9b29373bcba2f0
-
SHA512
ed49f293542458d75f106daceb454f5d207b5f1565c5273a447e9b27b2263fb937cb1fb529cf0390c9feb200139d95a73049a0df14530a06413630052e4992b8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc517077b656996b8073d473fc8c8232ab0c05f1a2d2a469f9b29373bcba2f0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc517077b656996b8073d473fc8c8232ab0c05f1a2d2a469f9b29373bcba2f0N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3000
-