Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 04:35
Behavioral task
behavioral1
Sample
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll
Resource
win10v2004-20220901-en
General
-
Target
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll
-
Size
30KB
-
MD5
613bd35c954253f726fe9687d137ca70
-
SHA1
e3cdd6c6eaf684505223d38c74c635379c0ff031
-
SHA256
9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef
-
SHA512
9d96aa7fd77f69c3340a7d7a6d8a409e9d7707655d53f739f699e6b0b84501b014f75de210ab6834aa36034eb7d1f20f048210e2a526898bdf565ab64e48dda2
-
SSDEEP
768:gogYVYCjnn15hc21l7Ivg+SboVUnbcuyD7Us:gwOgOI9Rnouy8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000005c50-59.dat acprotect behavioral1/files/0x0007000000005c50-60.dat acprotect -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\msflxgrd\Parameters\ServiceDll = "C:\\Windows\\system32\\msflxgrd.ocx.dll" rundll32.exe -
resource yara_rule behavioral1/memory/788-58-0x0000000000130000-0x000000000014B000-memory.dmp upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/files/0x0007000000005c50-60.dat upx behavioral1/memory/1868-62-0x00000000000D0000-0x00000000000EB000-memory.dmp upx behavioral1/memory/788-64-0x0000000000130000-0x000000000014B000-memory.dmp upx behavioral1/memory/1868-65-0x00000000000D0000-0x00000000000EB000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1868 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\msflxgrd.ocx.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef.dll,#12⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:788
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5613bd35c954253f726fe9687d137ca70
SHA1e3cdd6c6eaf684505223d38c74c635379c0ff031
SHA2569cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef
SHA5129d96aa7fd77f69c3340a7d7a6d8a409e9d7707655d53f739f699e6b0b84501b014f75de210ab6834aa36034eb7d1f20f048210e2a526898bdf565ab64e48dda2
-
Filesize
30KB
MD5613bd35c954253f726fe9687d137ca70
SHA1e3cdd6c6eaf684505223d38c74c635379c0ff031
SHA2569cb3b37506d5ebcaf53b783c619bfed22bc1129c559477677a9175719ebb77ef
SHA5129d96aa7fd77f69c3340a7d7a6d8a409e9d7707655d53f739f699e6b0b84501b014f75de210ab6834aa36034eb7d1f20f048210e2a526898bdf565ab64e48dda2