Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 06:18
Behavioral task
behavioral1
Sample
e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll
Resource
win7-20221111-en
6 signatures
150 seconds
General
-
Target
e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll
-
Size
350KB
-
MD5
0dedc5f545a092e16fe9b7a2b12dd04f
-
SHA1
c648ac6f5abfc1326f77d6a72108c5a8bdc3d7f1
-
SHA256
e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d
-
SHA512
fc65b4b8a72513e39df61a5e52e205a84b69d0f09489052ba2144528b7de9cfdad6f5fc94f26248845ce8747b83a3b0450a600140298ac7a413354e118613e76
-
SSDEEP
6144:z/ShjRnvBJnjZm015eWChvc4OFXA1Iss1056uvGUOQKwsUo/kluSHW5R1qlWNQM:zKNRpJUIYK4eXA1vjM2zo0a/MW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\Noexplorer = "1" regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 568 956 WerFault.exe 28 -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll" regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 956 regsvr32.exe 956 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1992 wrote to memory of 956 1992 regsvr32.exe 28 PID 1992 wrote to memory of 956 1992 regsvr32.exe 28 PID 1992 wrote to memory of 956 1992 regsvr32.exe 28 PID 1992 wrote to memory of 956 1992 regsvr32.exe 28 PID 1992 wrote to memory of 956 1992 regsvr32.exe 28 PID 1992 wrote to memory of 956 1992 regsvr32.exe 28 PID 1992 wrote to memory of 956 1992 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll2⤵
- UAC bypass
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 3483⤵
- Program crash
PID:568
-
-