Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll
Resource
win10v2004-20221111-en
General
-
Target
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll
-
Size
248KB
-
MD5
38dcf72fcdd4c9d8133a7c5ed59afbff
-
SHA1
5dfb480216d8a6ba230b04aef53257c5d726c4d3
-
SHA256
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4
-
SHA512
7f1df60416ea97bcd150a890faa5e6c5c6ae84eabbfdb1200cbb78c8530a23a3a05d17e3ce06435e8ed55c78a794c77056c55106913da6b5340aa76fcebf8596
-
SSDEEP
3072:grhcH+gXNN7ysh4vkbZvWYdWMZwVZ1WDTSgrxwPvi44YBauccqTa3w:wcH+ghZ5WM6VPWD2yzKauC+w
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\Windows\\system32\\ctfmonjdi.exe" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{10602E62-95C9-3DD5-B224-80061AD3D14B} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{10602E62-95C9-3DD5-B224-80061AD3D14B}\IExplore = "1" regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctfmonjdi.exe regsvr32.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C023B273-C91A-3DCA-8614-36F065A36250} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\TypeLib\ = "{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\ = "LIB" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID\ = "{10602E62-95C9-3DD5-B224-80061AD3D14B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C023B273-C91A-3DCA-8614-36F065A36250} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID\ = "{10602E62-95C9-3DD5-B224-80061AD3D14B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\ProgID\ = "D.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\TypeLib\ = "{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\ = "IDOMPeek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B31E7349-33AF-36D6-AFEB-E03C6C819A1B}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C023B273-C91A-3DCA-8614-36F065A36250}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10602E62-95C9-3DD5-B224-80061AD3D14B}\VersionIndependentProgID\ = "D" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1016 1660 regsvr32.exe 27 PID 1660 wrote to memory of 1016 1660 regsvr32.exe 27 PID 1660 wrote to memory of 1016 1660 regsvr32.exe 27 PID 1660 wrote to memory of 1016 1660 regsvr32.exe 27 PID 1660 wrote to memory of 1016 1660 regsvr32.exe 27 PID 1660 wrote to memory of 1016 1660 regsvr32.exe 27 PID 1660 wrote to memory of 1016 1660 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll2⤵
- Sets file execution options in registry
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
PID:1016
-