Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 19:55

General

  • Target

    c72666a1d3f15c7446da228e214500a44177fd0db7275be69e89291d72d090b7.dll

  • Size

    311KB

  • MD5

    64b3a74b344b34ff6fb8041a5b71b200

  • SHA1

    226df3e75485b73a9f23abab36af5226f205c972

  • SHA256

    c72666a1d3f15c7446da228e214500a44177fd0db7275be69e89291d72d090b7

  • SHA512

    c479cd205b7a0cfa91f9242c163a03fda0bd81635ebfcd1b1072f04713fc36db2cba413ff84e5b6c2e3cec6e3745ada2258fb3f3564b7f50e6df3579c2a8963c

  • SSDEEP

    6144:yCnUHYupMgts5/Few368XEZLRW6uPB0Rz+HC9PDwNaDM0eYn:y0UhU4jWVBoz+HC9bLo0eYn

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Modifies registry class 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c72666a1d3f15c7446da228e214500a44177fd0db7275be69e89291d72d090b7.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\c72666a1d3f15c7446da228e214500a44177fd0db7275be69e89291d72d090b7.dll
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\regsvr32mgr.exe
        C:\Windows\SysWOW64\regsvr32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:940
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:468
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C1B522D1-42B9-11ED-9551-6E705F4A26E5}.dat

    Filesize

    5KB

    MD5

    006520d7bbfcdf76870153032ef69490

    SHA1

    77ad2a2fd9fec9b8ad7ac0240cba73afae66a426

    SHA256

    63492fb895587fb10da040fb47649059e5cec11d7f76fe442270f80c46044dcb

    SHA512

    3b4d05d382cb06d1d8a050d5585598c8973040d9129dd7d8f4c33cf35a21ff1e6993fb35b498b888cb7f7ae2928bfb8ed497b75d22d1ececa7d947106b77f047

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C1B549E1-42B9-11ED-9551-6E705F4A26E5}.dat

    Filesize

    3KB

    MD5

    b39db227c8ef46f721c547d645f02d4d

    SHA1

    b1e936927f0ded5f1547a97e27f324eff5ab21f2

    SHA256

    ef87d325f49b9513a197bd065116e06d713465d15728dad908030e30f6fb2e68

    SHA512

    6533e613f00eb1c2e4d4a24f2bb0c41b4dcc2e903f4968a4cf13e1c38b2c927106f6ef0c7fec5d67889fab650825c19fafa9904d6259440975fc8b78727e37af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QDH3JDKK.txt

    Filesize

    608B

    MD5

    fcf30f41560c6ebd66b5d78261d5925d

    SHA1

    625680c45e65068b5db0df9d8c675bf209dc0e4b

    SHA256

    d25333615bae3d3eac70f4350da0f4e5c1eb7397d5c067ee4dc388af28b9ec15

    SHA512

    709dd517684d52620fbf08a64691e5621897348b91333d593157f54b611f189e505e79cda7be6cba95114ecda24604dafc460d6a8903b0aaef9afdc3d28e84e1

  • C:\Windows\SysWOW64\regsvr32mgr.exe

    Filesize

    132KB

    MD5

    ebc35bf5774a4b75cd45638cecb74db3

    SHA1

    3a4858d3ab2074b6d2d5a999a7443c683af2417b

    SHA256

    52c970b575040b26c6c357f1aa64288544578a229b9be70acd0f860f55cca346

    SHA512

    365feb8dccdbf66ff9dd5e1aa08126b0c6da0cb1fe6cf7a986cbb6c66928f7c3282492c11946598652e18fa695f7ea7021cd3f5943a20650e9efe829a0891ca1

  • \Windows\SysWOW64\regsvr32mgr.exe

    Filesize

    132KB

    MD5

    ebc35bf5774a4b75cd45638cecb74db3

    SHA1

    3a4858d3ab2074b6d2d5a999a7443c683af2417b

    SHA256

    52c970b575040b26c6c357f1aa64288544578a229b9be70acd0f860f55cca346

    SHA512

    365feb8dccdbf66ff9dd5e1aa08126b0c6da0cb1fe6cf7a986cbb6c66928f7c3282492c11946598652e18fa695f7ea7021cd3f5943a20650e9efe829a0891ca1

  • \Windows\SysWOW64\regsvr32mgr.exe

    Filesize

    132KB

    MD5

    ebc35bf5774a4b75cd45638cecb74db3

    SHA1

    3a4858d3ab2074b6d2d5a999a7443c683af2417b

    SHA256

    52c970b575040b26c6c357f1aa64288544578a229b9be70acd0f860f55cca346

    SHA512

    365feb8dccdbf66ff9dd5e1aa08126b0c6da0cb1fe6cf7a986cbb6c66928f7c3282492c11946598652e18fa695f7ea7021cd3f5943a20650e9efe829a0891ca1

  • memory/944-63-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/944-64-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/1960-54-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp

    Filesize

    8KB

  • memory/1968-56-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB