Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 05:55
Behavioral task
behavioral1
Sample
582da3ba348b78220805d801b6d2cdeb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
582da3ba348b78220805d801b6d2cdeb.exe
Resource
win10v2004-20231215-en
General
-
Target
582da3ba348b78220805d801b6d2cdeb.exe
-
Size
42KB
-
MD5
582da3ba348b78220805d801b6d2cdeb
-
SHA1
003e9ec78589dbc5c365cf0a2f9aac13ac087cda
-
SHA256
8189a26f6dd7cdd3413d5136998a886135ddae1e2b052232457627f1dae50efd
-
SHA512
2f2ccc8d516c61d06740284890896110df867310be78dc914760b3fed22833fc65d478dd61c48fc1ba1ea6c2eba98538a421da4fdd1ff67656296d4ca56f2c56
-
SSDEEP
768:omv1AfVOs9Lm1BS4GwVmueZvxFnUvwxejJ3GKM7IhUa+GIueroKs8b+4eMOL626:oigVOu4GwVcvUIwjJ3Gj7IhUaXIuUViC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2632 regsvr32.exe -
resource yara_rule behavioral1/memory/2612-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2612-3-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2612-11-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Modifies WinLogon 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logondll 582da3ba348b78220805d801b6d2cdeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 582da3ba348b78220805d801b6d2cdeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logondll\DllName = "fly1040.dll" 582da3ba348b78220805d801b6d2cdeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logondll\Asynchronous = "1" 582da3ba348b78220805d801b6d2cdeb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logondll\Impersonate = "0" 582da3ba348b78220805d801b6d2cdeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logondll\Startup = "EventStartup" 582da3ba348b78220805d801b6d2cdeb.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\flymain1040.dll 582da3ba348b78220805d801b6d2cdeb.exe File created C:\Windows\SysWOW64\flymain.dll 582da3ba348b78220805d801b6d2cdeb.exe File created C:\Windows\SysWOW64\flyplug.dll 582da3ba348b78220805d801b6d2cdeb.exe File created C:\Windows\SysWOW64\fly1040.dll 582da3ba348b78220805d801b6d2cdeb.exe File created C:\Windows\SysWOW64\dllcache\fly1040.dll 582da3ba348b78220805d801b6d2cdeb.exe File created C:\Windows\SysWOW64\flymain1040.dll 582da3ba348b78220805d801b6d2cdeb.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "°Ù¶È" 582da3ba348b78220805d801b6d2cdeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.baidu.com/s?wd={searchTerms}&tn=bdwxl_5007032ahm_pg&ie=utf-8" 582da3ba348b78220805d801b6d2cdeb.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{7138527F-430B-45B0-B164-9AA396644263}\ = "{7138527F-430B-45B0-B164-9AA396644263}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\InprocServer32\ = "C:\\Windows\\SysWow64\\flyplug.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\InprocServer32\ThreadingModel = "both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\ = "ÓÒ¼ü²å¼þ 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\ProgID\ = "My.Control.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\TypeLib\ = "{34B90EED-B1AB-42A9-BA14-F8825153F575}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control\ = "Control Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control\CLSID\ = "{7138527F-430B-45B0-B164-9AA396644263}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\VersionIndependentProgID\ = "My.Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\{7138527F-430B-45B0-B164-9AA396644263} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control.1\ = "Control Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\HELPDIR\ = "C:\\Windows\\System32" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\ = "IControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\ = "Control Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\flyplug.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7138527F-430B-45B0-B164-9AA396644263}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\ = "IControl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control.1\CLSID\ = "{7138527F-430B-45B0-B164-9AA396644263}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\My.Control\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34B90EED-B1AB-42A9-BA14-F8825153F575} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{19E65A85-5FEC-4CC3-8F60-738F1E9F1CD0}\TypeLib\ = "{34B90EED-B1AB-42A9-BA14-F8825153F575}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2612 582da3ba348b78220805d801b6d2cdeb.exe 2612 582da3ba348b78220805d801b6d2cdeb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2612 582da3ba348b78220805d801b6d2cdeb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2632 2612 582da3ba348b78220805d801b6d2cdeb.exe 29 PID 2612 wrote to memory of 2632 2612 582da3ba348b78220805d801b6d2cdeb.exe 29 PID 2612 wrote to memory of 2632 2612 582da3ba348b78220805d801b6d2cdeb.exe 29 PID 2612 wrote to memory of 2632 2612 582da3ba348b78220805d801b6d2cdeb.exe 29 PID 2612 wrote to memory of 2632 2612 582da3ba348b78220805d801b6d2cdeb.exe 29 PID 2612 wrote to memory of 2632 2612 582da3ba348b78220805d801b6d2cdeb.exe 29 PID 2612 wrote to memory of 2632 2612 582da3ba348b78220805d801b6d2cdeb.exe 29 PID 2612 wrote to memory of 1196 2612 582da3ba348b78220805d801b6d2cdeb.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\582da3ba348b78220805d801b6d2cdeb.exe"C:\Users\Admin\AppData\Local\Temp\582da3ba348b78220805d801b6d2cdeb.exe"2⤵
- Modifies WinLogon
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\System32\flyplug.dll3⤵
- Loads dropped DLL
- Modifies registry class
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5569319e985fb4e871e3111d1e03e4312
SHA1bf278da43091d950122b8a02cacaf902a7df1648
SHA2566ac956bfda09977764a9a01c5fc2cf353d193af768b6b6a818cadafe0637762d
SHA5128984476bb57da2fd48e9f9d07c5d34252e73d6328c888089b0073c1dba3657e576024834a7427818c00a05bb5c1fad8c9bdf6b94a79e5665c824beb3a340b35b