Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:24
Behavioral task
behavioral1
Sample
09fec51fad3273e022f8edfc45e57980.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
09fec51fad3273e022f8edfc45e57980.dll
-
Size
422KB
-
MD5
09fec51fad3273e022f8edfc45e57980
-
SHA1
4b4b6c0755d9938baf385abbbbb94a0302e70fea
-
SHA256
1e3fea244a7cddfb5e5c6e97cfa671e708f26e53f80b6dc879e9f80af7fdd385
-
SHA512
e8925c6cc3d0cd06bfd7b178f1bf8b41153249763a079c9a5df69939d8c4a3b2f987c1577ff4f9453b32a62098d3605e6b484d883f05708e63be2a62ac40014a
-
SSDEEP
6144:VEo0JkXmwglUcvBECgqpHNaXLhI966AGkAjOpoaY7QCQ8jHzhdR5jZUZZaBs4:VEoFWLKcvPBeq6xGJOpq80HtBNUZZW
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c523f7f7-59eb-ed5d-caf0-3b61e8127f81} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c523f7f7-59eb-ed5d-caf0-3b61e8127f81}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c523f7f7-59eb-ed5d-caf0-3b61e8127f81}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\09fec51fad3273e022f8edfc45e57980.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c523f7f7-59eb-ed5d-caf0-3b61e8127f81}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c523f7f7-59eb-ed5d-caf0-3b61e8127f81} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c523f7f7-59eb-ed5d-caf0-3b61e8127f81}\ = "dcads" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c523f7f7-59eb-ed5d-caf0-3b61e8127f81}\InProcServer32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2412 1240 regsvr32.exe 16 PID 1240 wrote to memory of 2412 1240 regsvr32.exe 16 PID 1240 wrote to memory of 2412 1240 regsvr32.exe 16
Processes
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\09fec51fad3273e022f8edfc45e57980.dll1⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2412
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\09fec51fad3273e022f8edfc45e57980.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1240