Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.dll
Resource
win7-20220812-en
General
-
Target
dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.dll
-
Size
410KB
-
MD5
b2b67f1659a03d52718ea57e36be69f3
-
SHA1
59b7a41baa1588e069f52e4d2a10bed5add38301
-
SHA256
dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28
-
SHA512
d9ddc19df4cb693d378d188b60e467d836603861ccb59e47b492cfb55907c91cbfc6f1369f995f5b906e71e923f8ce36669b6283f31682286a27899b2262896a
-
SSDEEP
6144:gjOYqU+d7ZXS0T6mhY8m7rS/6OYAyZ1K6CHgsWd57Rl1eF7fYs7J/w5AYdxuHJLP:uqU+NZi0umiLchgVZ8ws7efg
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}\ regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}\ProgID\ = "dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.manbsou" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.manbsou regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.manbsou\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.manbsou\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.manbsou\Clsid\ = "{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73A1F53E-B252-4ABF-9806-C26AB5FDFBD1} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4772 4172 regsvr32.exe 80 PID 4172 wrote to memory of 4772 4172 regsvr32.exe 80 PID 4172 wrote to memory of 4772 4172 regsvr32.exe 80
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dd49cb677a7366ae5fc401f9e09b4e0cbd76c617eb6e3530038a7b4a61065b28.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4772
-