Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
05/11/2022, 23:29
221105-3gsdnaabh2 1005/11/2022, 15:13
221105-sl48xagdd3 1027/10/2022, 06:35
221027-hcm8xsbce5 10Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2022, 23:29
Behavioral task
behavioral1
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
Resource
win10-20220812-en
General
-
Target
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll
-
Size
111KB
-
MD5
e3564138588cba04c873bd054458f8b9
-
SHA1
157ec7421e1333b714d01a750b6d5d6517a92c45
-
SHA256
e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8
-
SHA512
2a2e8ce45a928bcffdb40ebf6559c1f071bb3feccfd9cfe355e593acb559ecf84858cf4474708d311317ab08b3f981eba7c8b80dceae973839a0eec9049665c8
-
SSDEEP
1536:3ui/9Xb791Wff4K84oeRnobxxm2ShclQaLMin8F5vAC+WEQbAmTjTpeyv0+gPzff:H/J7jWHT/oegcaQF5XEgHbpeyvfgT
Malware Config
Extracted
zloader
DLLobnova
1017
https://fdsjfjdsfjdsjfdjsfh.com/gate.php
https://fdsjfjdsfjdsdsjajjs.com/gate.php
https://idisaudhasdhasdj.com/gate.php
https://dsjdjsjdsadhasdas.com/gate.php
https://dsdjfhdsufudhjas.com/gate.php
https://dsdjfhdsufudhjas.info/gate.php
https://fdsjfjdsfjdsdsjajjs.info/gate.php
https://idisaudhasdhasdj.info/gate.php
-
build_id
28
Signatures
-
Blocklisted process makes network request 64 IoCs
flow pid Process 75 4688 msiexec.exe 76 4688 msiexec.exe 78 4688 msiexec.exe 80 4688 msiexec.exe 82 4688 msiexec.exe 84 4688 msiexec.exe 86 4688 msiexec.exe 87 4688 msiexec.exe 88 4688 msiexec.exe 90 4688 msiexec.exe 91 4688 msiexec.exe 92 4688 msiexec.exe 93 4688 msiexec.exe 94 4688 msiexec.exe 95 4688 msiexec.exe 96 4688 msiexec.exe 97 4688 msiexec.exe 98 4688 msiexec.exe 102 4688 msiexec.exe 103 4688 msiexec.exe 104 4688 msiexec.exe 106 4688 msiexec.exe 108 4688 msiexec.exe 109 4688 msiexec.exe 110 4688 msiexec.exe 111 4688 msiexec.exe 112 4688 msiexec.exe 113 4688 msiexec.exe 116 4688 msiexec.exe 117 4688 msiexec.exe 118 4688 msiexec.exe 120 4688 msiexec.exe 121 4688 msiexec.exe 122 4688 msiexec.exe 123 4688 msiexec.exe 124 4688 msiexec.exe 125 4688 msiexec.exe 131 4688 msiexec.exe 132 4688 msiexec.exe 133 4688 msiexec.exe 134 4688 msiexec.exe 135 4688 msiexec.exe 136 4688 msiexec.exe 137 4688 msiexec.exe 138 4688 msiexec.exe 139 4688 msiexec.exe 140 4688 msiexec.exe 141 4688 msiexec.exe 142 4688 msiexec.exe 143 4688 msiexec.exe 144 4688 msiexec.exe 145 4688 msiexec.exe 146 4688 msiexec.exe 147 4688 msiexec.exe 148 4688 msiexec.exe 149 4688 msiexec.exe 150 4688 msiexec.exe 151 4688 msiexec.exe 152 4688 msiexec.exe 153 4688 msiexec.exe 154 4688 msiexec.exe 155 4688 msiexec.exe 156 4688 msiexec.exe 157 4688 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ogogog = "rundll32.exe C:\\Users\\Admin\\AppData\\Roaming\\Hedi\\ubfa.dll,DllRegisterServer" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4844 set thread context of 4688 4844 regsvr32.exe 89 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 4688 msiexec.exe Token: SeSecurityPrivilege 4688 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4844 4128 regsvr32.exe 81 PID 4128 wrote to memory of 4844 4128 regsvr32.exe 81 PID 4128 wrote to memory of 4844 4128 regsvr32.exe 81 PID 4844 wrote to memory of 4688 4844 regsvr32.exe 89 PID 4844 wrote to memory of 4688 4844 regsvr32.exe 89 PID 4844 wrote to memory of 4688 4844 regsvr32.exe 89 PID 4844 wrote to memory of 4688 4844 regsvr32.exe 89 PID 4844 wrote to memory of 4688 4844 regsvr32.exe 89
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e3932ab83bc05de2e91d321c4d479ff1aa3d10fdbd91e1687c80cc0ec88270e8.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-