Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2024, 19:21 UTC

General

  • Target

    a8a858363a5a1b10574ebd9f62f196da396aeaca28da280d80e8d19d9cc06e19N.dll

  • Size

    203KB

  • MD5

    ddd39837b6da7a5e1315d93f5aa609d0

  • SHA1

    87dd8213076a272cbc0a8b3700d3fc51fa9c7802

  • SHA256

    a8a858363a5a1b10574ebd9f62f196da396aeaca28da280d80e8d19d9cc06e19

  • SHA512

    20b0b1d756a41b3958e7475b18824a958c6a532fd71e0e3787b943027fca342319a4147f3b46900f5b084de3b503277d8d5f3ca7c61a29ac00849ce48adb4aad

  • SSDEEP

    3072:hJ8IMILmCa3yx6oFEdgVXnFYf7C9Ugfxm3Nep9viMsA7:0kmCaiEoFEd+FYOtxmdeviMsM

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a8a858363a5a1b10574ebd9f62f196da396aeaca28da280d80e8d19d9cc06e19N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a8a858363a5a1b10574ebd9f62f196da396aeaca28da280d80e8d19d9cc06e19N.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2760-1-0x0000000010000000-0x0000000010033000-memory.dmp

    Filesize

    204KB

  • memory/2760-0-0x0000000010000000-0x0000000010033000-memory.dmp

    Filesize

    204KB

  • memory/2760-2-0x0000000010000000-0x0000000010033000-memory.dmp

    Filesize

    204KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.