Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 20:52 UTC

General

  • Target

    240e78d4e3f4e1d34f5b9db1b67b8cf742ae0fe9ec9e5b96b5592dc329b3cf91.dll

  • Size

    76KB

  • MD5

    c9de721af5de67628e586cafc47f0457

  • SHA1

    6652e84b9f42f66b2d13c971fb7244d3e9a4e7aa

  • SHA256

    240e78d4e3f4e1d34f5b9db1b67b8cf742ae0fe9ec9e5b96b5592dc329b3cf91

  • SHA512

    94a57eb3d05af1dc9c5d03f6c2026ed8011b34f43c5867d5a327749208115db02071084a38065671dab7ed35536f060a8cbe5996423dbb0f8bdb3318809bfd73

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zxh3nJnu7v:c8y93KQjy7G55riF1cMo03Pnu7v

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\240e78d4e3f4e1d34f5b9db1b67b8cf742ae0fe9ec9e5b96b5592dc329b3cf91.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\240e78d4e3f4e1d34f5b9db1b67b8cf742ae0fe9ec9e5b96b5592dc329b3cf91.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2720-1-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2720-0-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2720-2-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.