Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
158s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30/01/2022, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
6262b83425e85d203b4708dc629987ffaa4dff8ab03042e1332b8910b5e75a85.dll
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6262b83425e85d203b4708dc629987ffaa4dff8ab03042e1332b8910b5e75a85.dll
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
6262b83425e85d203b4708dc629987ffaa4dff8ab03042e1332b8910b5e75a85.dll
-
Size
130KB
-
MD5
59cb505d1636119f2881caa14bf42326
-
SHA1
b20e69127f2ca0ae4852c379dcd65348f01d1cc7
-
SHA256
6262b83425e85d203b4708dc629987ffaa4dff8ab03042e1332b8910b5e75a85
-
SHA512
90667a78df7946ac6b9c90175402d699b1d61bb0b6d30d565b0f7fcc326bd2fc50dcb2a8b304fdf44cb33818c82c779caa23814258c312af596947b576cd5fa3
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs
-
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 424 regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\Msresiwr.ttf regsvr32.exe File opened for modification \??\c:\windows\SysWOW64\Msresiwr.ttf regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe 2840 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 424 regsvr32.exe Token: SeLoadDriverPrivilege 424 regsvr32.exe Token: SeShutdownPrivilege 424 regsvr32.exe Token: SeTcbPrivilege 424 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2840 2800 regsvr32.exe 68 PID 2800 wrote to memory of 2840 2800 regsvr32.exe 68 PID 2800 wrote to memory of 2840 2800 regsvr32.exe 68 PID 2840 wrote to memory of 424 2840 regsvr32.exe 69 PID 2840 wrote to memory of 424 2840 regsvr32.exe 69 PID 2840 wrote to memory of 424 2840 regsvr32.exe 69
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6262b83425e85d203b4708dc629987ffaa4dff8ab03042e1332b8910b5e75a85.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6262b83425e85d203b4708dc629987ffaa4dff8ab03042e1332b8910b5e75a85.dll2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u "c:\windows\system32\Msresiwr.ttf"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:424
-
-