Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 14:18
Behavioral task
behavioral1
Sample
8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.dll
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.dll
-
Size
194KB
-
MD5
e103e5bb3852c8b775f1ee3844fca2be
-
SHA1
5cca17c7109b68f64e1af746e7523a7cc5a20a28
-
SHA256
8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61
-
SHA512
0ba08b4b94facf1469a40c83b3f53f156a5e0f6c0bed119dbf09d3d010aa2afb7b9ea48ef2c983b91c14493e77567e7652751bc89600024d60df6016359e25b5
-
SSDEEP
3072:EILYp/6oDftXv4PHBWehnCUb4kJLkRz+cY0jiQhwiPn9Fj71KfCA1W2SnakmC:h897xX8YUnCMRJ4O0jpwiPn9FNKfvqtz
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.Java (TM)\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78}\ProgID\ = "8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.Java (TM)" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.Java (TM) regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.Java (TM)\ = "Java (TM)" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.Java (TM)\Clsid\ = "{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8DFD7EF6-AAF8-4C8F-A14F-FC93EB592B78}\ = "Java (TM)" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1608 1092 regsvr32.exe 27 PID 1092 wrote to memory of 1608 1092 regsvr32.exe 27 PID 1092 wrote to memory of 1608 1092 regsvr32.exe 27 PID 1092 wrote to memory of 1608 1092 regsvr32.exe 27 PID 1092 wrote to memory of 1608 1092 regsvr32.exe 27 PID 1092 wrote to memory of 1608 1092 regsvr32.exe 27 PID 1092 wrote to memory of 1608 1092 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8246efb58d6c54e672f1dc2c0f823d7fb435480bda140d31d6ef79d3f6a63b61.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1608
-