Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 00:22
Behavioral task
behavioral1
Sample
f9289b353b53145a0ae81bfc0446d10fc6706fc765661c1ea3710b9d75871135N.dll
Resource
win7-20240903-en
General
-
Target
f9289b353b53145a0ae81bfc0446d10fc6706fc765661c1ea3710b9d75871135N.dll
-
Size
76KB
-
MD5
31ded88c0c8d9241a71f240da02a87e0
-
SHA1
aa54b09b5b91db34c436e94ac91b9c56c20b49dd
-
SHA256
f9289b353b53145a0ae81bfc0446d10fc6706fc765661c1ea3710b9d75871135
-
SHA512
fc7c188fa3c8b6e554930db3caff6418243452a61c96fac5483cd603003f8997aead40d4ada7bc5a6e572a161dfaa6cf6839b4b0864f37f15c92d81c7261db4c
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZynF88dNgMn9Q9D64:c8y93KQjy7G55riF1cMo03EM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3680-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3680-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3336 3680 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3680 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3680 1940 rundll32.exe 83 PID 1940 wrote to memory of 3680 1940 rundll32.exe 83 PID 1940 wrote to memory of 3680 1940 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9289b353b53145a0ae81bfc0446d10fc6706fc765661c1ea3710b9d75871135N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9289b353b53145a0ae81bfc0446d10fc6706fc765661c1ea3710b9d75871135N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 7123⤵
- Program crash
PID:3336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3680 -ip 36801⤵PID:4044