Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 16:29 UTC
Behavioral task
behavioral1
Sample
4cdbc625c34fdfd45edc7b55fe51b946731c9da57ea29170b7621f48e1773a32N.dll
Resource
win7-20241023-en
General
-
Target
4cdbc625c34fdfd45edc7b55fe51b946731c9da57ea29170b7621f48e1773a32N.dll
-
Size
76KB
-
MD5
bc88d36264bff903f11271b66c983420
-
SHA1
b6d1e37e41c59dc3cff18a1c9b9f8afe8faa87d0
-
SHA256
4cdbc625c34fdfd45edc7b55fe51b946731c9da57ea29170b7621f48e1773a32
-
SHA512
9e788975033394549dba690622863bc464c64ec0d2471980ef2cdad2d3286cdfe4daf8115dea07b4ed88526183b568be7f10824c7f4d2a6167b02d7e9b917660
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZhiOWmiCc/Wjp:c8y93KQjy7G55riF1cMo03jiOWmc/w
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4496-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4496-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1492 4496 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4496 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 548 wrote to memory of 4496 548 rundll32.exe 83 PID 548 wrote to memory of 4496 548 rundll32.exe 83 PID 548 wrote to memory of 4496 548 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cdbc625c34fdfd45edc7b55fe51b946731c9da57ea29170b7621f48e1773a32N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cdbc625c34fdfd45edc7b55fe51b946731c9da57ea29170b7621f48e1773a32N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 7003⤵
- Program crash
PID:1492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4496 -ip 44961⤵PID:3704
Network
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request220.190.18.2.in-addr.arpaIN PTRResponse220.190.18.2.in-addr.arpaIN PTRa2-18-190-220deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request181.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
133.32.126.40.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
220.190.18.2.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
181.129.81.91.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
180.129.81.91.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa