Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 22:59

General

  • Target

    7b8365ccecee9e7c8a1566a17009aad1.dll

  • Size

    432KB

  • MD5

    7b8365ccecee9e7c8a1566a17009aad1

  • SHA1

    44dbf9a102da4e9505b8550adc7907c90af2b790

  • SHA256

    c15cfc1c2cec25430e43bfd677bb840ebf9fc5083d246ad6b5dca169a114b58e

  • SHA512

    c9f3dfa5dc28f6635f2e877dce36dd10bff579e7fc283f3d4d7d0381b7055a1ee60d700a92823f781add05a8f77d60deb346f51424c83d98943b30fd5bb51c5d

  • SSDEEP

    12288:wtWmHRm01ubISdq6xGJOpqQeBgKMXbDziP:wtNHVoISY0Gkp08by

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7b8365ccecee9e7c8a1566a17009aad1.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\7b8365ccecee9e7c8a1566a17009aad1.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/220-0-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/220-1-0x0000000002250000-0x00000000022AA000-memory.dmp

    Filesize

    360KB

  • memory/220-3-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/220-2-0x00000000032C0000-0x00000000032C3000-memory.dmp

    Filesize

    12KB

  • memory/220-4-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/220-5-0x0000000002590000-0x0000000002591000-memory.dmp

    Filesize

    4KB

  • memory/220-6-0x0000000003340000-0x0000000003341000-memory.dmp

    Filesize

    4KB

  • memory/220-7-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/220-8-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/220-9-0x00000000033C0000-0x00000000033C1000-memory.dmp

    Filesize

    4KB

  • memory/220-11-0x0000000003400000-0x0000000003401000-memory.dmp

    Filesize

    4KB

  • memory/220-10-0x00000000033E0000-0x00000000033E1000-memory.dmp

    Filesize

    4KB

  • memory/220-12-0x0000000003420000-0x0000000003421000-memory.dmp

    Filesize

    4KB

  • memory/220-13-0x0000000003450000-0x0000000003451000-memory.dmp

    Filesize

    4KB

  • memory/220-14-0x0000000003470000-0x0000000003471000-memory.dmp

    Filesize

    4KB

  • memory/220-15-0x0000000003490000-0x0000000003491000-memory.dmp

    Filesize

    4KB

  • memory/220-16-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/220-17-0x00000000034D0000-0x00000000034D1000-memory.dmp

    Filesize

    4KB

  • memory/220-18-0x00000000026F0000-0x00000000026F1000-memory.dmp

    Filesize

    4KB

  • memory/220-19-0x0000000003320000-0x0000000003321000-memory.dmp

    Filesize

    4KB

  • memory/220-20-0x0000000003360000-0x0000000003361000-memory.dmp

    Filesize

    4KB