Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    38s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 11:13

General

  • Target

    19e9e9f2d5dcb357aaf47955605bbe10.dll

  • Size

    380KB

  • MD5

    19e9e9f2d5dcb357aaf47955605bbe10

  • SHA1

    2ed3b28ec1446a88dd44ffbbe17137598d854fbb

  • SHA256

    7b9f6e331bd8f3002cb4b3a23dade43bc3c3465823a8e24e8dd4552de6e2ca20

  • SHA512

    a8ecfc82e0174f0b7e5782ecdc1f6d408962e1b4443c3839b42ce7241b854bed260f763bda4c1c98857f9376bf01ac1e5686ffaf8fa1e82db9164c6777fc971a

  • SSDEEP

    6144:49nH+nnClbLQwdTPHAxayVIZg/Z3Ft6sFaXEdzP35dWPPXx+f/NhrBBCWC+:49InCJQsTPCs0ZVt6s9dzJ48XNhrSJ+

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\19e9e9f2d5dcb357aaf47955605bbe10.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\19e9e9f2d5dcb357aaf47955605bbe10.dll,#1
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/a1l8.dll"
        3⤵
          PID:2712
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b4cb.dll"
          3⤵
            PID:704
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4f3r.dll"
            3⤵
              PID:4724
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b34o.dll"
              3⤵
                PID:2208
              • C:\Windows\SysWOW64\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b34o.dll"
                3⤵
                • Loads dropped DLL
                • Installs/modifies Browser Helper Object
                • Modifies registry class
                PID:3644
              • C:\Windows\SysWOW64\341d.exe
                C:\Windows\system32/341d.exe -i
                3⤵
                • Executes dropped EXE
                PID:4464
              • C:\Windows\SysWOW64\341d.exe
                C:\Windows\system32/341d.exe -s
                3⤵
                • Executes dropped EXE
                PID:2292
              • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
                C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
                3⤵
                  PID:1268
                • C:\Windows\SysWOW64\rundll32.exe
                  C:\Windows\system32\rundll32 C:\Windows\system32/341e.dll, Always
                  3⤵
                    PID:2364
              • C:\Windows\SysWOW64\341d.exe
                C:\Windows\SysWOW64\341d.exe
                1⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                PID:3532
                • C:\Windows\SysWOW64\rundll32.exe
                  C:\Windows\system32\rundll32 C:\Windows\system32/341e.dll,Always
                  2⤵
                    PID:4816

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

                  Filesize

                  75KB

                  MD5

                  f5ccc320b059ed9c0928725221c1071a

                  SHA1

                  8e66a9b74be6816966acaf2c81a38b4cfb959caf

                  SHA256

                  d3170051b4c1ab613f8cdf7458058903e09ac210291c24ecf31dbbec52da86fb

                  SHA512

                  98e1afabbd05602255f1860bad5e32130118824ba4b1b3ee2553420b37925d719bf72d9c94349c628d118daaa380df80d53f92ed185ef227de9111e38d447a30

                • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

                  Filesize

                  92KB

                  MD5

                  185833fb5f5a811b3552e4096061b2ea

                  SHA1

                  0917cb868bd27e5a7152cf057c237074bf461667

                  SHA256

                  7c4a6562049fc005c064081112a292fe91752907372e6172321faab18726603a

                  SHA512

                  af33b353974814f49ceaec8832cba1c228abe4f3d90990e73e1129a801f7bf02abfc76c27d4985e85618be895e09ca02f51a818a75a4d4302648ea98e9dfe1a2

                • memory/3532-128-0x0000000001260000-0x0000000001262000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-131-0x0000000001270000-0x0000000001272000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-160-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-161-0x0000000001310000-0x0000000001312000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-157-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-80-0x0000000000E50000-0x0000000000E52000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-79-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-158-0x0000000001300000-0x0000000001302000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-112-0x0000000000E60000-0x0000000000E62000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-111-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-115-0x0000000000FA0000-0x0000000000FA2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-114-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-155-0x00000000012F0000-0x00000000012F2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-119-0x0000000000FB0000-0x0000000000FB2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-118-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-122-0x0000000000FC0000-0x0000000000FC2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-121-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-130-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-124-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-127-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-154-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-151-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-125-0x0000000001250000-0x0000000001252000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-134-0x0000000001280000-0x0000000001282000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-133-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-136-0x0000000001290000-0x0000000001292000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-138-0x00000000012A0000-0x00000000012A2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-141-0x00000000012B0000-0x00000000012B2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-140-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-142-0x0000000001290000-0x0000000001292000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-145-0x00000000012C0000-0x00000000012C2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-144-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-146-0x00000000012A0000-0x00000000012A2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-148-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3532-149-0x00000000012D0000-0x00000000012D2000-memory.dmp

                  Filesize

                  8KB

                • memory/3532-152-0x00000000012E0000-0x00000000012E2000-memory.dmp

                  Filesize

                  8KB

                • memory/3644-116-0x0000000000DE0000-0x0000000000DE2000-memory.dmp

                  Filesize

                  8KB

                • memory/3644-59-0x0000000010000000-0x0000000010020000-memory.dmp

                  Filesize

                  128KB

                • memory/3644-60-0x0000000000DE0000-0x0000000000DE2000-memory.dmp

                  Filesize

                  8KB

                • memory/4400-0-0x0000000010000000-0x0000000010078000-memory.dmp

                  Filesize

                  480KB

                • memory/4400-1-0x0000000000860000-0x0000000000862000-memory.dmp

                  Filesize

                  8KB

                • memory/4400-78-0x0000000000860000-0x0000000000862000-memory.dmp

                  Filesize

                  8KB

                • memory/4400-50-0x0000000010000000-0x0000000010078000-memory.dmp

                  Filesize

                  480KB