Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
951b1a47c0059ee94f198eb9d3d984c69cadc6b4791fb7e410d87cd5abd736b3N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
951b1a47c0059ee94f198eb9d3d984c69cadc6b4791fb7e410d87cd5abd736b3N.dll
Resource
win10v2004-20241007-en
General
-
Target
951b1a47c0059ee94f198eb9d3d984c69cadc6b4791fb7e410d87cd5abd736b3N.dll
-
Size
33KB
-
MD5
23ff264832f39676f9256235f4e2dd50
-
SHA1
dd95b3ab0989a55379dd7b281c781c0611fc7884
-
SHA256
951b1a47c0059ee94f198eb9d3d984c69cadc6b4791fb7e410d87cd5abd736b3
-
SHA512
e6f598181d3407713f8bb067b8b62e772f9b43a5a5ab1bd7e2e2224ea424070e915e1c6e0d2724fca1912bcec5e955307d0fa6744f757c29ca619c6a0b24bf3c
-
SSDEEP
768:7+aoi6qZOpQB5ZpOc06HCMN9GT6RJ5BHUEy2YEZZEo6:7+av6qZ4QxpP0AtNfRJ5BHxY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\951b1a47c0059ee94f198eb9d3d984c69cadc6b4791fb7e410d87cd5abd736b3N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\951b1a47c0059ee94f198eb9d3d984c69cadc6b4791fb7e410d87cd5abd736b3N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2700
-