Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
19c16af5458f297ccf3d2e63e0485d97.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
19c16af5458f297ccf3d2e63e0485d97.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
19c16af5458f297ccf3d2e63e0485d97.dll
-
Size
223KB
-
MD5
19c16af5458f297ccf3d2e63e0485d97
-
SHA1
915a0a5a5a6f1e1e49d7006b44705cc06905a5de
-
SHA256
b80452bbec8a1804b080f7c1b0fbabdccfe20473aad7650ba171db7eb7de1591
-
SHA512
17023825574c789f855f4abd6ce922565b0ba87ed028e52a1e37ca1c9a96a7921a75ed1f14dd261fc340dc5cec67a874c6a037c48b1643a17e2ba0a133f4d56e
-
SSDEEP
3072:RJvIKcHr3Fqgirb5nRn35T6/3PkUg7S3m9JvxtWf1Zk3Q4DKcrcUM:RJQK8bFqVrtn94jg+aJv7M2jJYUM
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\19c16af5458f297ccf3d2e63e0485d97\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\19c16af5458f297ccf3d2e63e0485d97.dll" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2268 svchost.exe 2268 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 5080 4968 regsvr32.exe 91 PID 4968 wrote to memory of 5080 4968 regsvr32.exe 91 PID 4968 wrote to memory of 5080 4968 regsvr32.exe 91
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\19c16af5458f297ccf3d2e63e0485d97.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\19c16af5458f297ccf3d2e63e0485d97.dll2⤵
- Sets DLL path for service in the registry
PID:5080
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k 19c16af5458f297ccf3d2e63e0485d971⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268