Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/02/2023, 12:02

230209-n7e4pabe53 7

09/02/2023, 12:01

230209-n7bq9sbb7y 7

21/01/2022, 22:50

220121-2sqtjabgf5 9

Analysis

  • max time kernel
    27s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 12:01

General

  • Target

    f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll

  • Size

    143KB

  • MD5

    80a2bb7884b8bad4a8e83c2cb03ee343

  • SHA1

    6620029006c7174987ddcbe48dc0d4ceb6fe584c

  • SHA256

    f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8

  • SHA512

    6af7016a956f226fe38cfe9fb6cb64044cb47706a509dc117c061f92ea30e59013936dd942ab1a1744d080a30e6d0605866b694edf761e32818e9208af21a85c

  • SSDEEP

    3072:IqmV+SbU/ZriU7Qrx74MfunDR6s2r5OubTJOOJrFUSyYe/hkYo1bHVqMHf8QO:IilxriU7UcMfun/2VOStr5ZI7o1LkM/8

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8.dll
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\ProgramData\temp\2187.tmp.bat
        3⤵
          PID:268
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\ProgramData\temp\3749.tmp.bat
          3⤵
          • Deletes itself
          PID:628
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s "C:\ProgramData\Software\Microsoft\Windows\Defender\AutoUpdate.dll"
          3⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          PID:1716

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Software\Microsoft\Windows\Defender\AutoUpdate.dll

      Filesize

      143KB

      MD5

      80a2bb7884b8bad4a8e83c2cb03ee343

      SHA1

      6620029006c7174987ddcbe48dc0d4ceb6fe584c

      SHA256

      f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8

      SHA512

      6af7016a956f226fe38cfe9fb6cb64044cb47706a509dc117c061f92ea30e59013936dd942ab1a1744d080a30e6d0605866b694edf761e32818e9208af21a85c

    • C:\ProgramData\temp\2187.tmp.bat

      Filesize

      126B

      MD5

      79300fe02cb4e2603e409d7aa22c0d55

      SHA1

      fe9fdc9478bf2a3f2adf97dcb092086969d6296f

      SHA256

      5b19ca8d87746d93509aa0c1bf8d0f9d0713befcda809b98a516ee2d6aaaa00b

      SHA512

      f8ccaaa509525d8a17698a51470ed79c4f87d7e8a615d40394df1e19f92ca6f4dab12fdbd2aa1430ed0e76ac55e573e55e848c147659ede9be634e867f723d7c

    • C:\ProgramData\temp\3749.tmp.bat

      Filesize

      274B

      MD5

      fc8d86b83c73244cbf8235655d536a6e

      SHA1

      b11baa292dc13b4fa6f6a06a284c8553383412e9

      SHA256

      fa944dabe1725e24fddd214b16fc46e8da1a3f15b819dc4de025bb363b12b9ac

      SHA512

      9844d51bae6ce80a07a5e65fcfaa87dbbda117b45941306854bb632fb6800ba8bef215b6c5d0f36ded8b5a39a00e8cf84f9efb982ea13d815a73b90a1aee6ec0

    • \ProgramData\Software\Microsoft\Windows\Defender\AutoUpdate.dll

      Filesize

      143KB

      MD5

      80a2bb7884b8bad4a8e83c2cb03ee343

      SHA1

      6620029006c7174987ddcbe48dc0d4ceb6fe584c

      SHA256

      f8e972a26117bd14f5ec4dca9de0244d0bfd29bbbfd9104b2ccdc49fa93416d8

      SHA512

      6af7016a956f226fe38cfe9fb6cb64044cb47706a509dc117c061f92ea30e59013936dd942ab1a1744d080a30e6d0605866b694edf761e32818e9208af21a85c

    • memory/1516-54-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp

      Filesize

      8KB

    • memory/1624-62-0x0000000074200000-0x000000007425C000-memory.dmp

      Filesize

      368KB

    • memory/1624-57-0x0000000074200000-0x000000007425C000-memory.dmp

      Filesize

      368KB

    • memory/1624-56-0x0000000075111000-0x0000000075113000-memory.dmp

      Filesize

      8KB

    • memory/1716-67-0x00000000741F0000-0x000000007424C000-memory.dmp

      Filesize

      368KB

    • memory/1716-68-0x00000000741F0000-0x000000007424C000-memory.dmp

      Filesize

      368KB