Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2024, 02:39 UTC

General

  • Target

    $PLUGINSDIR/typatnczxs.dll

  • Size

    194KB

  • MD5

    3f87ace1c278b0bc50d2322d6e6cf088

  • SHA1

    d91d0f54a8ecdcf3ab9ee15e84669eb4fa18d5e8

  • SHA256

    d49a0bb5abe0befd75a4f20ca92c28ba3a4d4828661ad103029f24487c3ae0e1

  • SHA512

    2b21bd3e2ab0161d7f28dd04119fdd3c7b2fe80bd4bfb733a3dab6601997ca428126bf77bbb5930a963c64130f344a6fa9a64f8a7a228302e2a59331634eff02

  • SSDEEP

    6144:1UtJEr7KQNzZ/vDXqxnfNahvFp1cck4X3rm6v:1neYFD6TG9pjni6v

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\typatnczxs.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\typatnczxs.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.