Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 17:28

General

  • Target

    85f7083f9fb16cdea99828ad14ee6cc81ce1f950c1cba3a497d4758206992ad5.dll

  • Size

    383KB

  • MD5

    3edd8bba70645dc69f88f16a4c6e1993

  • SHA1

    cd419ce0e17794c645b9ba1691020838512f7ba2

  • SHA256

    85f7083f9fb16cdea99828ad14ee6cc81ce1f950c1cba3a497d4758206992ad5

  • SHA512

    e565824ed9f6784881228b2c6770e59eb130ece467594245a905ea9c30fc36c8a91c6198c20daca93296f65827b21db9e329580024179ca79b601e3ab7b39be3

  • SSDEEP

    6144:aYgf9i9/LlhOPjLe0NY+DfA7wCJTcwMyYUlbS2WTs94zqbMeNMzFOV2hU:azf9k/Rh+24TKW2WTs7jNohU

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\85f7083f9fb16cdea99828ad14ee6cc81ce1f950c1cba3a497d4758206992ad5.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\85f7083f9fb16cdea99828ad14ee6cc81ce1f950c1cba3a497d4758206992ad5.dll
      2⤵
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:4212
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:3992
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3336
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3336 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3496

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      2e02780939de763a8bb3e91dfbf21980

      SHA1

      47e818dcbc1d307b43654dfe3a03b9a7625d9ce4

      SHA256

      971abb405a443302f8c61627933bd0f46ed6953f5815e298974e6f7532908748

      SHA512

      51709ae31e885719d848f619c4b3e732b0765a5349484f7c4ca524072a6b0d75f33d3f6c015a0ed4fd188a43d5cc9e0d221d1d7cca5a31a044b73fcbcebbe5fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      b6fa5a6e922325817a3e11085bed6739

      SHA1

      e09026bd569bc8123a819fdd4b61d677ff8dbc3e

      SHA256

      198b2a9c808fefec2f2a459441c4761803df1739bda1d2fcaa9f7616ac493ea8

      SHA512

      84ecbd8f9c8df283062794dfb12f1ee62b8e983554e683e416657764e63570fbca406458ef6050f6acea98abaa63f9845a1f5cd34e47f9e296cf4ec50fc5055f