Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
c3025710bf347b61c58cb6728c521b168f85482c0abac852a8f7989a36ab237bN.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c3025710bf347b61c58cb6728c521b168f85482c0abac852a8f7989a36ab237bN.dll
Resource
win10v2004-20240802-en
General
-
Target
c3025710bf347b61c58cb6728c521b168f85482c0abac852a8f7989a36ab237bN.dll
-
Size
7KB
-
MD5
80d3709cafee336f6bde99627a09c700
-
SHA1
868d41b2d5e7c619d9c238f6d13c192c34fd7974
-
SHA256
c3025710bf347b61c58cb6728c521b168f85482c0abac852a8f7989a36ab237b
-
SHA512
ee27161c4f2b31493be5f3b137798f5ee3c223a59c67a8fd2d843867bb887fd694f36ce0adb473f489c1b105386fbbc304f02fb497e3212b024d32e6451aa5c2
-
SSDEEP
48:66ay5YVO3EVkApc2wp8hH1NZn5EquglQ067YbPWjbABbgL3q9J5S2hmc:b3EVkApcX4Hiv0hbPZq3qX5S2hV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1556 2276 rundll32.exe 30 PID 2276 wrote to memory of 1556 2276 rundll32.exe 30 PID 2276 wrote to memory of 1556 2276 rundll32.exe 30 PID 2276 wrote to memory of 1556 2276 rundll32.exe 30 PID 2276 wrote to memory of 1556 2276 rundll32.exe 30 PID 2276 wrote to memory of 1556 2276 rundll32.exe 30 PID 2276 wrote to memory of 1556 2276 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3025710bf347b61c58cb6728c521b168f85482c0abac852a8f7989a36ab237bN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3025710bf347b61c58cb6728c521b168f85482c0abac852a8f7989a36ab237bN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1556
-