Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
42dd01e971b71bb9e62f068fa79d68d3.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42dd01e971b71bb9e62f068fa79d68d3.dll
Resource
win10v2004-20231215-en
General
-
Target
42dd01e971b71bb9e62f068fa79d68d3.dll
-
Size
540KB
-
MD5
42dd01e971b71bb9e62f068fa79d68d3
-
SHA1
00de4532b08d66eccf83fde22a9ebe50c576749b
-
SHA256
3278b79e1d7f019d7a8d9f092853619b730bf499a544d2315f87b05f68a43e11
-
SHA512
28cb61b676f721479be2b6f2a0ef49fe34b5c57f01fc5ba52ed5a1a47929a15cad9eec497f819015e74bc638fdff8789041269b01a1f9ddcbc11482939cf45ae
-
SSDEEP
6144:Jzt4VYcPTu0xQZIJBvW9v5wlgInmCg0j2b2HTPlccgVPif6hF5:hCPq0xzsR5s/m70jOweN
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\LocalServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\ProgID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\TypeLib rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\Version rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\VersionIndependentProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\AppID = "{03837503-098b-11d8-9414-505054503030}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\Version\ = "1.0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\InprocServer32\ = "%SystemRoot%\\SysWow64\\pla.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\InprocServer32\ThreadingModel = "both" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\LocalServer32\ = "%SystemRoot%\\SysWow64\\plasrv.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\TypeLib\ = "{03837500-098B-11D8-9414-505054503030}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\ProgID\ = "PLA.LegacyTraceSessionCollection.1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\VersionIndependentProgID\ = "PLA.LegacyTraceSessionCollection" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7517112D-B1F6-49F5-B1F6-49F5B1F649F5}\ = "LegacyTraceSessionCollection" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1436 rundll32.exe Token: SeIncBasePriorityPrivilege 1436 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1436 1104 rundll32.exe 28 PID 1104 wrote to memory of 1436 1104 rundll32.exe 28 PID 1104 wrote to memory of 1436 1104 rundll32.exe 28 PID 1104 wrote to memory of 1436 1104 rundll32.exe 28 PID 1104 wrote to memory of 1436 1104 rundll32.exe 28 PID 1104 wrote to memory of 1436 1104 rundll32.exe 28 PID 1104 wrote to memory of 1436 1104 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42dd01e971b71bb9e62f068fa79d68d3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42dd01e971b71bb9e62f068fa79d68d3.dll,#12⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1436
-