Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
fd1366d0a1628d7231dbd4c4d43ae1f9080456d5a90dce3e7d382d2d848b3305N.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fd1366d0a1628d7231dbd4c4d43ae1f9080456d5a90dce3e7d382d2d848b3305N.dll
Resource
win10v2004-20241007-en
General
-
Target
fd1366d0a1628d7231dbd4c4d43ae1f9080456d5a90dce3e7d382d2d848b3305N.dll
-
Size
3KB
-
MD5
91ee2a4e2a4728f4d230d33afe889db0
-
SHA1
6a1ddbe52a523f37ea6afb0157a5fb88bb99f59f
-
SHA256
fd1366d0a1628d7231dbd4c4d43ae1f9080456d5a90dce3e7d382d2d848b3305
-
SHA512
d1e063f69529f35cbdc7b24a487121256ce2654e375dcb18ace50c15b5af553396f3e75acc4ff9982726f1f29853707c4a524897866398ecdb9444b1ef0f1195
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30 PID 3012 wrote to memory of 2860 3012 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd1366d0a1628d7231dbd4c4d43ae1f9080456d5a90dce3e7d382d2d848b3305N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd1366d0a1628d7231dbd4c4d43ae1f9080456d5a90dce3e7d382d2d848b3305N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2860
-