Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 22:47
Behavioral task
behavioral1
Sample
25e3170535f25d4880f966648007e55bb4b52747985f416c565e1178e0fda14cN.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
25e3170535f25d4880f966648007e55bb4b52747985f416c565e1178e0fda14cN.dll
Resource
win10v2004-20241007-en
General
-
Target
25e3170535f25d4880f966648007e55bb4b52747985f416c565e1178e0fda14cN.dll
-
Size
76KB
-
MD5
03aa97f1c0b43809d5072fbe96ac6890
-
SHA1
26434e89f29cb24d14c52c5067d362df72b588d7
-
SHA256
25e3170535f25d4880f966648007e55bb4b52747985f416c565e1178e0fda14c
-
SHA512
e5b064c2ed3928ef6ee95e48175c7d41a1f2c6d27b2855fe48cf5ddb82adee1b4ca26cb7f927fffa4cc4eb3ea448cd87e1d815d5ccec54d87ee8cc315473eeec
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZW3zMF:c8y93KQjy7G55riF1cMo03k3z+
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
resource yara_rule behavioral1/memory/3008-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/3008-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/3008-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3008 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3008 2380 rundll32.exe 29 PID 2380 wrote to memory of 3008 2380 rundll32.exe 29 PID 2380 wrote to memory of 3008 2380 rundll32.exe 29 PID 2380 wrote to memory of 3008 2380 rundll32.exe 29 PID 2380 wrote to memory of 3008 2380 rundll32.exe 29 PID 2380 wrote to memory of 3008 2380 rundll32.exe 29 PID 2380 wrote to memory of 3008 2380 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25e3170535f25d4880f966648007e55bb4b52747985f416c565e1178e0fda14cN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25e3170535f25d4880f966648007e55bb4b52747985f416c565e1178e0fda14cN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-