Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 14:25
Behavioral task
behavioral1
Sample
adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll
-
Size
1.0MB
-
MD5
82526b36b1359d710553553789d5bed5
-
SHA1
3235a98f1f96b9d1f3dc9c41b7e054dfe8e58e43
-
SHA256
adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723
-
SHA512
31e642343c339b91fc5790a882d944dba22be5d9d5b0ebde39a3e579869feef3d5e6b67729399ee2d4ce09354514dd59ee1299f5983566b157aaf2cba69ae4b6
-
SSDEEP
24576:sLSwyb/tPUdQAYnDxf+z4W36Ofois2NUO59:sLBE/RDAYx+cSosN9
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\ = "Recursos de Evento de Experiência com Aplicativo" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\ regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2028 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2028 1516 regsvr32.exe 27 PID 1516 wrote to memory of 2028 1516 regsvr32.exe 27 PID 1516 wrote to memory of 2028 1516 regsvr32.exe 27 PID 1516 wrote to memory of 2028 1516 regsvr32.exe 27 PID 1516 wrote to memory of 2028 1516 regsvr32.exe 27 PID 1516 wrote to memory of 2028 1516 regsvr32.exe 27 PID 1516 wrote to memory of 2028 1516 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2028
-