Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/02/2023, 12:02
230209-n7e4pabe53 709/02/2023, 12:01
230209-n7bq9sbb7y 721/01/2022, 22:50
220121-2sqtjabgf5 9Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
09/02/2023, 12:01
Behavioral task
behavioral1
Sample
f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll
Resource
win10v2004-20220901-en
General
-
Target
f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll
-
Size
143KB
-
MD5
80a2bb7884b8bad4a8e83c2cb03ee343
-
SHA1
6620029006c7174987ddcbe48dc0d4ceb6fe584c
-
SHA256
f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8
-
SHA512
6af7016a956f226fe38cfe9fb6cb64044cb47706a509dc117c061f92ea30e59013936dd942ab1a1744d080a30e6d0605866b694edf761e32818e9208af21a85c
-
SSDEEP
3072:IqmV+SbU/ZriU7Qrx74MfunDR6s2r5OubTJOOJrFUSyYe/hkYo1bHVqMHf8QO:IilxriU7UcMfun/2VOStr5ZI7o1LkM/8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b0000000142c8-65.dat acprotect behavioral1/files/0x000b0000000142c8-66.dat acprotect -
Deletes itself 1 IoCs
pid Process 628 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1716 regsvr32.exe -
resource yara_rule behavioral1/memory/1624-57-0x0000000074200000-0x000000007425C000-memory.dmp upx behavioral1/memory/1624-62-0x0000000074200000-0x000000007425C000-memory.dmp upx behavioral1/files/0x000b0000000142c8-65.dat upx behavioral1/files/0x000b0000000142c8-66.dat upx behavioral1/memory/1716-67-0x00000000741F0000-0x000000007424C000-memory.dmp upx behavioral1/memory/1716-68-0x00000000741F0000-0x000000007424C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderAutoUpdate = "regsvr32.exe /s \"C:\\ProgramData\\Software\\Microsoft\\Windows\\Defender\\AutoUpdate.dll\"" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefenderAutoUpdate = "regsvr32.exe /s \"C:\\ProgramData\\Software\\Microsoft\\Windows\\Defender\\AutoUpdate.dll\"" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 regsvr32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1624 1516 regsvr32.exe 27 PID 1516 wrote to memory of 1624 1516 regsvr32.exe 27 PID 1516 wrote to memory of 1624 1516 regsvr32.exe 27 PID 1516 wrote to memory of 1624 1516 regsvr32.exe 27 PID 1516 wrote to memory of 1624 1516 regsvr32.exe 27 PID 1516 wrote to memory of 1624 1516 regsvr32.exe 27 PID 1516 wrote to memory of 1624 1516 regsvr32.exe 27 PID 1624 wrote to memory of 268 1624 regsvr32.exe 28 PID 1624 wrote to memory of 268 1624 regsvr32.exe 28 PID 1624 wrote to memory of 268 1624 regsvr32.exe 28 PID 1624 wrote to memory of 268 1624 regsvr32.exe 28 PID 1624 wrote to memory of 628 1624 regsvr32.exe 30 PID 1624 wrote to memory of 628 1624 regsvr32.exe 30 PID 1624 wrote to memory of 628 1624 regsvr32.exe 30 PID 1624 wrote to memory of 628 1624 regsvr32.exe 30 PID 1624 wrote to memory of 1716 1624 regsvr32.exe 31 PID 1624 wrote to memory of 1716 1624 regsvr32.exe 31 PID 1624 wrote to memory of 1716 1624 regsvr32.exe 31 PID 1624 wrote to memory of 1716 1624 regsvr32.exe 31 PID 1624 wrote to memory of 1716 1624 regsvr32.exe 31 PID 1624 wrote to memory of 1716 1624 regsvr32.exe 31 PID 1624 wrote to memory of 1716 1624 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c C:\ProgramData\temp\2187.tmp.bat3⤵PID:268
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\ProgramData\temp\3749.tmp.bat3⤵
- Deletes itself
PID:628
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\ProgramData\Software\Microsoft\Windows\Defender\AutoUpdate.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD580a2bb7884b8bad4a8e83c2cb03ee343
SHA16620029006c7174987ddcbe48dc0d4ceb6fe584c
SHA256f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8
SHA5126af7016a956f226fe38cfe9fb6cb64044cb47706a509dc117c061f92ea30e59013936dd942ab1a1744d080a30e6d0605866b694edf761e32818e9208af21a85c
-
Filesize
126B
MD579300fe02cb4e2603e409d7aa22c0d55
SHA1fe9fdc9478bf2a3f2adf97dcb092086969d6296f
SHA2565b19ca8d87746d93509aa0c1bf8d0f9d0713befcda809b98a516ee2d6aaaa00b
SHA512f8ccaaa509525d8a17698a51470ed79c4f87d7e8a615d40394df1e19f92ca6f4dab12fdbd2aa1430ed0e76ac55e573e55e848c147659ede9be634e867f723d7c
-
Filesize
274B
MD5fc8d86b83c73244cbf8235655d536a6e
SHA1b11baa292dc13b4fa6f6a06a284c8553383412e9
SHA256fa944dabe1725e24fddd214b16fc46e8da1a3f15b819dc4de025bb363b12b9ac
SHA5129844d51bae6ce80a07a5e65fcfaa87dbbda117b45941306854bb632fb6800ba8bef215b6c5d0f36ded8b5a39a00e8cf84f9efb982ea13d815a73b90a1aee6ec0
-
Filesize
143KB
MD580a2bb7884b8bad4a8e83c2cb03ee343
SHA16620029006c7174987ddcbe48dc0d4ceb6fe584c
SHA256f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8
SHA5126af7016a956f226fe38cfe9fb6cb64044cb47706a509dc117c061f92ea30e59013936dd942ab1a1744d080a30e6d0605866b694edf761e32818e9208af21a85c