Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/01/2025, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
d00ee2c683efd35ccd6642c3da7379a5100ed92b50f4650219a825b7aa03f734.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d00ee2c683efd35ccd6642c3da7379a5100ed92b50f4650219a825b7aa03f734.dll
Resource
win10v2004-20241007-en
General
-
Target
d00ee2c683efd35ccd6642c3da7379a5100ed92b50f4650219a825b7aa03f734.dll
-
Size
7KB
-
MD5
ee4dc5167978df644c073dc399f789b2
-
SHA1
436f2834670544f3556b9d8b854b4d60188b23e3
-
SHA256
d00ee2c683efd35ccd6642c3da7379a5100ed92b50f4650219a825b7aa03f734
-
SHA512
7870aa693978129a0f77a9f38495262ff8c80b50f800edf7a996e20852ffb49874f2d3436d1c7d1c3dc1a9b461c5812ced25b3c3735fb0c93344be1a2c1f43ff
-
SSDEEP
96:hyZxm/jmjhjvj3jcZGV418tgSfR2P74GZOVDveQvsxU12zTWS:2M/SdjbgY3tsP74GU8qsm12PW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1644 1588 rundll32.exe 30 PID 1588 wrote to memory of 1644 1588 rundll32.exe 30 PID 1588 wrote to memory of 1644 1588 rundll32.exe 30 PID 1588 wrote to memory of 1644 1588 rundll32.exe 30 PID 1588 wrote to memory of 1644 1588 rundll32.exe 30 PID 1588 wrote to memory of 1644 1588 rundll32.exe 30 PID 1588 wrote to memory of 1644 1588 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d00ee2c683efd35ccd6642c3da7379a5100ed92b50f4650219a825b7aa03f734.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d00ee2c683efd35ccd6642c3da7379a5100ed92b50f4650219a825b7aa03f734.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1644
-