Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 09:35
Behavioral task
behavioral1
Sample
a9de1801ccf40ae59236f8c7e2bc92f78257eb34ad671c5d75df4d09df095932.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
a9de1801ccf40ae59236f8c7e2bc92f78257eb34ad671c5d75df4d09df095932.dll
-
Size
435KB
-
MD5
b1f464821e35b0d7ff9758ae46ae611e
-
SHA1
5ceb2a7d7e77e84b457ad08c8fbdc304feab2ecc
-
SHA256
a9de1801ccf40ae59236f8c7e2bc92f78257eb34ad671c5d75df4d09df095932
-
SHA512
94dcfd65e96296283cac14163327580a864b40e00cc255a3345e1693eb258a38669f8b926999f95165bb5fcb8e8cf922d6012d07d72353b1a1bf30fa091af982
-
SSDEEP
12288:Z/r4dcwXrhGgGJq6xGJOpqXRypiI3QTVu:ZzfwEgGs0Gkp3pv8Vu
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ebf06a6d-de0e-f3b1-0d10-b3da3933c78a} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ebf06a6d-de0e-f3b1-0d10-b3da3933c78a}\NoExplorer = "\"\"" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{66aad729-3be4-f0ed-9ed5-8f133996b70d} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars regsvr32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ebf06a6d-de0e-f3b1-0d10-b3da3933c78a}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ebf06a6d-de0e-f3b1-0d10-b3da3933c78a}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d}\Implemented Categories\{00021493-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ebf06a6d-de0e-f3b1-0d10-b3da3933c78a} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ebf06a6d-de0e-f3b1-0d10-b3da3933c78a}\ = "mysidesearch search enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d}\ = "Search panel" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a9de1801ccf40ae59236f8c7e2bc92f78257eb34ad671c5d75df4d09df095932.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ebf06a6d-de0e-f3b1-0d10-b3da3933c78a}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a9de1801ccf40ae59236f8c7e2bc92f78257eb34ad671c5d75df4d09df095932.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66aad729-3be4-f0ed-9ed5-8f133996b70d}\Implemented Categories regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4892 4880 regsvr32.exe 80 PID 4880 wrote to memory of 4892 4880 regsvr32.exe 80 PID 4880 wrote to memory of 4892 4880 regsvr32.exe 80
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\a9de1801ccf40ae59236f8c7e2bc92f78257eb34ad671c5d75df4d09df095932.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\a9de1801ccf40ae59236f8c7e2bc92f78257eb34ad671c5d75df4d09df095932.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:4892
-