Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 04:39
Behavioral task
behavioral1
Sample
3f16bd75df296617d798dbc8486770c6099e815b25d9a9f7126a012daaa2fcbcN.dll
Resource
win7-20240708-en
General
-
Target
3f16bd75df296617d798dbc8486770c6099e815b25d9a9f7126a012daaa2fcbcN.dll
-
Size
76KB
-
MD5
2103227d409c0ba827b0d0515f28e7c0
-
SHA1
cce75d9c150bc1fcbe43198adc91a83445470ec5
-
SHA256
3f16bd75df296617d798dbc8486770c6099e815b25d9a9f7126a012daaa2fcbc
-
SHA512
10b14bc2dddd0195f6ba6d9ee5b395395b0301dd7573c0a38d6169028872116cb7a8a7e38f4075813c092724894951ad58c3a56779f511e7e29b4b978387e0c0
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZfTujW2aQO:c8y93KQjy7G55riF1cMo03xUfO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/372-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/372-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 116 372 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 372 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 372 3196 rundll32.exe 83 PID 3196 wrote to memory of 372 3196 rundll32.exe 83 PID 3196 wrote to memory of 372 3196 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f16bd75df296617d798dbc8486770c6099e815b25d9a9f7126a012daaa2fcbcN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f16bd75df296617d798dbc8486770c6099e815b25d9a9f7126a012daaa2fcbcN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 6923⤵
- Program crash
PID:116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 372 -ip 3721⤵PID:2332