Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 02:12
Behavioral task
behavioral1
Sample
761d7b6c96aaec486449301b2ed1cba3.dll
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
761d7b6c96aaec486449301b2ed1cba3.dll
-
Size
245KB
-
MD5
761d7b6c96aaec486449301b2ed1cba3
-
SHA1
00030610deeb71676701164d7f5415fceec1051e
-
SHA256
27b2744f6d737c8e86e1c35a65241abb1ddcf0e4017abcc1bdfd1af2e46fa499
-
SHA512
e10dddbeaf99c8e66e0254944a05227ff01faf44ebf80c2daa0244a7e59c6a651b3dfc50355cfff36b9408a4e4d8c2047da37c55dcb3a2f53cc96c2ce442b81c
-
SSDEEP
3072:L/3VR+kKBY0jp9k66tVOU2BfihKbMU2l8RbBD5JLD0kyJLwpFWtOvEHyw4tDykGB:J/Ki0V976bmBqhAp2l8RbLByJcMahwU
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\mqdrc.sys regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8728D167-41A6-4561-969C-CD75049F83AB} regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\761d7b6c96aaec486449301b2ed1cba3.dll regsvr32.exe File opened for modification C:\Windows\SysWOW64\761d7b6c96aaec486449301b2ed1cba3.dll regsvr32.exe File created C:\Windows\SysWOW64\dllcache\c_10093.n1s regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8728D167-41A6-4561-969C-CD75049F83AB}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8728D167-41A6-4561-969C-CD75049F83AB}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8728D167-41A6-4561-969C-CD75049F83AB}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\761d7b6c96aaec486449301b2ed1cba3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8728D167-41A6-4561-969C-CD75049F83AB}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\761d7b6c96aaec486449301b2ed1cba3.RDS.Dataspace regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\761d7b6c96aaec486449301b2ed1cba3.RDS.Dataspace\ = "RDS.Dataspace" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\761d7b6c96aaec486449301b2ed1cba3.RDS.Dataspace\Clsid\ = "{8728D167-41A6-4561-969C-CD75049F83AB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8728D167-41A6-4561-969C-CD75049F83AB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8728D167-41A6-4561-969C-CD75049F83AB}\ = "RDS.Dataspace" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\761d7b6c96aaec486449301b2ed1cba3.RDS.Dataspace\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8728D167-41A6-4561-969C-CD75049F83AB}\ProgID\ = "761d7b6c96aaec486449301b2ed1cba3.RDS.Dataspace" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 regsvr32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2548 2436 regsvr32.exe 28 PID 2436 wrote to memory of 2548 2436 regsvr32.exe 28 PID 2436 wrote to memory of 2548 2436 regsvr32.exe 28 PID 2436 wrote to memory of 2548 2436 regsvr32.exe 28 PID 2436 wrote to memory of 2548 2436 regsvr32.exe 28 PID 2436 wrote to memory of 2548 2436 regsvr32.exe 28 PID 2436 wrote to memory of 2548 2436 regsvr32.exe 28 PID 2548 wrote to memory of 412 2548 regsvr32.exe 3
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:412
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\761d7b6c96aaec486449301b2ed1cba3.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\761d7b6c96aaec486449301b2ed1cba3.dll2⤵
- Drops file in Drivers directory
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548
-