Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 06:18
Behavioral task
behavioral1
Sample
e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll
Resource
win7-20221111-en
6 signatures
150 seconds
General
-
Target
e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll
-
Size
350KB
-
MD5
0dedc5f545a092e16fe9b7a2b12dd04f
-
SHA1
c648ac6f5abfc1326f77d6a72108c5a8bdc3d7f1
-
SHA256
e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d
-
SHA512
fc65b4b8a72513e39df61a5e52e205a84b69d0f09489052ba2144528b7de9cfdad6f5fc94f26248845ce8747b83a3b0450a600140298ac7a413354e118613e76
-
SSDEEP
6144:z/ShjRnvBJnjZm015eWChvc4OFXA1Iss1056uvGUOQKwsUo/kluSHW5R1qlWNQM:zKNRpJUIYK4eXA1vjM2zo0a/MW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" regsvr32.exe -
resource yara_rule behavioral2/memory/2844-133-0x0000000000400000-0x0000000000527000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\Noexplorer = "1" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9F81D8B-04F9-4054-AEE5-F75DD71F0992}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll" regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2844 regsvr32.exe 2844 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3572 wrote to memory of 2844 3572 regsvr32.exe 82 PID 3572 wrote to memory of 2844 3572 regsvr32.exe 82 PID 3572 wrote to memory of 2844 3572 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e80e09e7d3aaf9f76539347408b9ed3bf3b1200e76e5c3ddc43c3d8c26df792d.dll2⤵
- UAC bypass
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2844 -ip 28441⤵PID:3700