Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
64c3e4ee25c9bfd030d0d0cda5ad64986b55ec5b1e8e46b18ae54f3a9f61a8bc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64c3e4ee25c9bfd030d0d0cda5ad64986b55ec5b1e8e46b18ae54f3a9f61a8bc.dll
Resource
win10v2004-20220812-en
General
-
Target
64c3e4ee25c9bfd030d0d0cda5ad64986b55ec5b1e8e46b18ae54f3a9f61a8bc.dll
-
Size
292KB
-
MD5
5e2cff47d2bb15c26a25c276f7767460
-
SHA1
f54527d687748a1920b74ec4ab307941cad6a9a5
-
SHA256
64c3e4ee25c9bfd030d0d0cda5ad64986b55ec5b1e8e46b18ae54f3a9f61a8bc
-
SHA512
4f3276d06a49958bfb8ffa399d9801fa8d7c45bcd8dd62c4171e6953df7771c2e411e6147b6c23ad32f952ed722d2039c136ec361f8cb762dce845bad198cf0f
-
SSDEEP
3072:CcBa/GzABNo6G4xtpikfyVGTeb4lqw4xerToLKjp94IG8373HMBuk2Ilo1GgtKAl:C3GzAm4gPxerTVxLMBKvGvg
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\aslpmqk = "{36086793-4215-42DC-B2F7-E0E7A08267A3}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36086793-4215-42DC-B2F7-E0E7A08267A3} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36086793-4215-42DC-B2F7-E0E7A08267A3}\InProcServer32\ = "C:\\Windows\\aslpmqk.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36086793-4215-42DC-B2F7-E0E7A08267A3}\InProcServer32 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 372 1920 rundll32.exe 82 PID 1920 wrote to memory of 372 1920 rundll32.exe 82 PID 1920 wrote to memory of 372 1920 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64c3e4ee25c9bfd030d0d0cda5ad64986b55ec5b1e8e46b18ae54f3a9f61a8bc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64c3e4ee25c9bfd030d0d0cda5ad64986b55ec5b1e8e46b18ae54f3a9f61a8bc.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:372
-