Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6.dll
Resource
win7-20240708-en
General
-
Target
27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6.dll
-
Size
170KB
-
MD5
1cb656c7ac7e08e5d50248ca7ee78a98
-
SHA1
aca2746215df07e753a2c8a3fe0eeac74873c1b3
-
SHA256
27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6
-
SHA512
032fb03ec05161cd28bf3cf2162976ccf6014e0cda0904f5115cc12d3402d2d79ef6ea7c6aa9bc782428f13a74714c1cde331cccfedef23d741392aa093dedf2
-
SSDEEP
3072:rV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erjy:rV/jTe38LiI4Oi75izyn+4lmd
Malware Config
Extracted
dridex
22201
210.65.244.187:443
162.241.41.92:2303
46.231.204.10:8172
185.183.159.100:4125
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2492-1-0x0000000074FD0000-0x0000000074FFF000-memory.dmp dridex_ldr -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2492 2376 rundll32.exe 30 PID 2376 wrote to memory of 2492 2376 rundll32.exe 30 PID 2376 wrote to memory of 2492 2376 rundll32.exe 30 PID 2376 wrote to memory of 2492 2376 rundll32.exe 30 PID 2376 wrote to memory of 2492 2376 rundll32.exe 30 PID 2376 wrote to memory of 2492 2376 rundll32.exe 30 PID 2376 wrote to memory of 2492 2376 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2492
-