Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
045634f9dd4eaf2f5bccbebca37faa8f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
045634f9dd4eaf2f5bccbebca37faa8f.dll
Resource
win10v2004-20231215-en
General
-
Target
045634f9dd4eaf2f5bccbebca37faa8f.dll
-
Size
100KB
-
MD5
045634f9dd4eaf2f5bccbebca37faa8f
-
SHA1
afd1b0ea0445c1a1bb74fd9c5b823f4ca4f4ae9a
-
SHA256
e965571d6d96c552d28c34ca8793bc06561ed8d853ac724ce9c63ccf1ab4a172
-
SHA512
8cad475c7042b9345e000527e2809e2d45f3ae1afd765471dc7843c433e9172985bf76af6876af72d86f40e8710aede8af237ca55a2f4fad198d9bc321700520
-
SSDEEP
3072:EhaMqdtNFMQb7BBWfGtTcTyYcXAkomqbIy:gaMC77BpU3mqIy
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 4788 rundll32.exe -
resource yara_rule behavioral2/memory/976-2-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral2/memory/976-3-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral2/memory/976-4-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral2/memory/976-5-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral2/memory/976-7-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral2/memory/4788-14-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral2/memory/4788-12-0x0000000010000000-0x0000000010040000-memory.dmp upx behavioral2/memory/4788-15-0x0000000010000000-0x0000000010040000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{965c1a60-5e57-43c4-a90f-7cfabe756596}\ = "{695657eb-afc7-f09a-4c34-75e506a1c569}" rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{965c1a60-5e57-43c4-a90f-7cfabe756596} rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nroljp.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\nroljp.dll rundll32.exe -
Modifies registry class 23 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\VersionIndependentProgID rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\TypeLib rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\InprocServer32 rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Implemented Categories rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965c1a60-5e57-43c4-a90f-7cfabe756596} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Version rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965c1a60-5e57-43c4-a90f-7cfabe756596}\InprocServer32 rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Programmable rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\ProgID rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965c1a60-5e57-43c4-a90f-7cfabe756596}\InprocServer32\ = "C:\\Windows\\SysWow64\\nroljp.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965c1a60-5e57-43c4-a90f-7cfabe756596}\InprocServer32\ThreadingModel = "free" rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3496 wrote to memory of 976 3496 rundll32.exe 87 PID 3496 wrote to memory of 976 3496 rundll32.exe 87 PID 3496 wrote to memory of 976 3496 rundll32.exe 87 PID 976 wrote to memory of 4788 976 rundll32.exe 90 PID 976 wrote to memory of 4788 976 rundll32.exe 90 PID 976 wrote to memory of 4788 976 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\045634f9dd4eaf2f5bccbebca37faa8f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\045634f9dd4eaf2f5bccbebca37faa8f.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\nroljp.dll",i3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5045634f9dd4eaf2f5bccbebca37faa8f
SHA1afd1b0ea0445c1a1bb74fd9c5b823f4ca4f4ae9a
SHA256e965571d6d96c552d28c34ca8793bc06561ed8d853ac724ce9c63ccf1ab4a172
SHA5128cad475c7042b9345e000527e2809e2d45f3ae1afd765471dc7843c433e9172985bf76af6876af72d86f40e8710aede8af237ca55a2f4fad198d9bc321700520