Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
2640ec73eb8aa419bbcf1819bb1062dcc7bbc8a1ec30c1a975e80e3182449f67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2640ec73eb8aa419bbcf1819bb1062dcc7bbc8a1ec30c1a975e80e3182449f67.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/hvlovmp.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/hvlovmp.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/hvlovmp.dll
-
Size
4KB
-
MD5
326a702abb396435221880fd71450249
-
SHA1
62f5a8e24469859250a5630e5b9280b8472e5a56
-
SHA256
f936817179febc934e8fa271aac522f989e6a6b43ebf42a44588f71ecae79042
-
SHA512
3018fa492ecbba49350db3f93df5f20852a47dd363315704737b2abd9c70bf86cc74858572a267e7fb79f8590c064ebaa0024ac84b41fb7fb684a3c23f7da615
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4256 2616 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2616 1916 rundll32.exe 82 PID 1916 wrote to memory of 2616 1916 rundll32.exe 82 PID 1916 wrote to memory of 2616 1916 rundll32.exe 82 PID 2616 wrote to memory of 4264 2616 rundll32.exe 83 PID 2616 wrote to memory of 4264 2616 rundll32.exe 83 PID 2616 wrote to memory of 4264 2616 rundll32.exe 83 PID 2616 wrote to memory of 4264 2616 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hvlovmp.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hvlovmp.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hvlovmp.dll,#13⤵PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 7003⤵
- Program crash
PID:4256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2616 -ip 26161⤵PID:1428