Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
8c626e3c8f9072269b37c31f9b64e83228f65f86ebb270d3dded78ed0bcbf849.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c626e3c8f9072269b37c31f9b64e83228f65f86ebb270d3dded78ed0bcbf849.dll
Resource
win10v2004-20220812-en
General
-
Target
8c626e3c8f9072269b37c31f9b64e83228f65f86ebb270d3dded78ed0bcbf849.dll
-
Size
192KB
-
MD5
d160fa29e8d5c6b048fe3ad8614c1afd
-
SHA1
9d092a5f4b394cda5b07112830052d9be2effc97
-
SHA256
8c626e3c8f9072269b37c31f9b64e83228f65f86ebb270d3dded78ed0bcbf849
-
SHA512
1be6addb66010d51612f093396a5a78a69d2bf4b632eada28705b94a04ab3ff264bd5cc3d656bb57a6d6c3a7565ee53de294f52987fb949bca8ae3f6d0849db7
-
SSDEEP
3072:nYrtjTh6jjVGe+LEvyrZIyoA5yAE+eo5Z/DbFPEc7JQ7qfjOZEtjN0uV:Yrq5vU6VArjD/XBfjOZKBV
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\agrlmvp = "{12C6733C-FB23-4093-AF6D-CFD49C01EB41}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12C6733C-FB23-4093-AF6D-CFD49C01EB41}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12C6733C-FB23-4093-AF6D-CFD49C01EB41} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{12C6733C-FB23-4093-AF6D-CFD49C01EB41}\InProcServer32\ = "C:\\Windows\\agrlmvp.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1776 1508 rundll32.exe 27 PID 1508 wrote to memory of 1776 1508 rundll32.exe 27 PID 1508 wrote to memory of 1776 1508 rundll32.exe 27 PID 1508 wrote to memory of 1776 1508 rundll32.exe 27 PID 1508 wrote to memory of 1776 1508 rundll32.exe 27 PID 1508 wrote to memory of 1776 1508 rundll32.exe 27 PID 1508 wrote to memory of 1776 1508 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c626e3c8f9072269b37c31f9b64e83228f65f86ebb270d3dded78ed0bcbf849.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c626e3c8f9072269b37c31f9b64e83228f65f86ebb270d3dded78ed0bcbf849.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1776
-