Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
f04c92c56a40f3881d3b144b5af170c50d0cd9827662322683adf87933a4df07.dll
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
f04c92c56a40f3881d3b144b5af170c50d0cd9827662322683adf87933a4df07.dll
-
Size
155KB
-
MD5
cf39a0cfd0ad4bfdb6c823d070df60a5
-
SHA1
75c11d8210035be542e8a1a9a6d1b0231842f9a7
-
SHA256
f04c92c56a40f3881d3b144b5af170c50d0cd9827662322683adf87933a4df07
-
SHA512
06b587a68d0397404cc993111eea7c322cf672cd1aaf69f7679057051dd7ff8eb7a4fdc9f93a22b19e85b976371b49779b7a0d4676f682841379bc555ca44f9e
-
SSDEEP
3072:aIoeLQGexZ2EI2kEJPgCMHqsjiQvsRHd0n6xUT+dV0peHYt:aoHahI2TPyGQvsR90n60+dV0py6
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F7C9E237-D0B2-4265-B4EC-B93F739D5471} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ regsvr32.exe -
Modifies registry class 47 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f04c92c56a40f3881d3b144b5af170c50d0cd9827662322683adf87933a4df07.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ = "IFffPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\ = "{C868EFBA-572E-4858-BE0C-9B1639D93F21}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\CLSID\ = "{F7C9E237-D0B2-4265-B4EC-B93F739D5471}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\ = "CFffPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CLSID\ = "{F7C9E237-D0B2-4265-B4EC-B93F739D5471}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\VersionIndependentProgID\ = "BHO.FffPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\ = "{C868EFBA-572E-4858-BE0C-9B1639D93F21}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f04c92c56a40f3881d3b144b5af170c50d0cd9827662322683adf87933a4df07.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CurVer\ = "BHO.FffPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ProgID\ = "BHO.FffPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\ = "CFffPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\ = "CFffPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ = "IFffPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EBFA4A89-7372-40E9-9A27-D9C680570477}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7C9E237-D0B2-4265-B4EC-B93F739D5471}\TypeLib\ = "{C868EFBA-572E-4858-BE0C-9B1639D93F21}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C868EFBA-572E-4858-BE0C-9B1639D93F21}\1.0\FLAGS\ = "0" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2476 wrote to memory of 4912 2476 regsvr32.exe 83 PID 2476 wrote to memory of 4912 2476 regsvr32.exe 83 PID 2476 wrote to memory of 4912 2476 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f04c92c56a40f3881d3b144b5af170c50d0cd9827662322683adf87933a4df07.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f04c92c56a40f3881d3b144b5af170c50d0cd9827662322683adf87933a4df07.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4912
-