Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
88001a027ebf7d771a5edf9193501a9c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
88001a027ebf7d771a5edf9193501a9c.dll
Resource
win10v2004-20231222-en
General
-
Target
88001a027ebf7d771a5edf9193501a9c.dll
-
Size
220KB
-
MD5
88001a027ebf7d771a5edf9193501a9c
-
SHA1
f5cbb6d75beb2da1a5e482b18cce3fde360d98b5
-
SHA256
c4e1d81dd32c21270bb756a19768e62ee77e29b4ede602e6e8db3f724c28925f
-
SHA512
8ad0b8a7a48911080120d97ff7bb6dd31e28daa7853341f6d24f2f138e8eb8c67e47205d9f142865f3e71064cb60c9a0fdd7d0934558b8d495b0699cf6c71ac4
-
SSDEEP
3072:lTxuLLIgfMFM8ljxy9TG3oqw9Jiaevqss7Bo8KAC9nAwTTBl2HURFuccjRYZ:qLLIgfMOGt86D0o8HClAm3PRFuXaZ
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\Windows\\system32\\ctfmon_tk.exe" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\IExplore = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B75E2632-1BDA-358F-9C95-DEF0C501193B} regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctfmon_tk.exe regsvr32.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\88001a027ebf7d771a5edf9193501a9c.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\VersionIndependentProgID\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\ = "LIB" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID\ = "{B75E2632-1BDA-358F-9C95-DEF0C501193B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\TypeLib\ = "{A9A6C443-A975-3070-BDA1-2460F12853AF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\ = "IDOMPeek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\ProgID\ = "D.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B75E2632-1BDA-358F-9C95-DEF0C501193B}\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{896A3E7A-8420-377B-BFF2-FF7F1E1E7C97}\TypeLib\ = "{A9A6C443-A975-3070-BDA1-2460F12853AF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID\ = "{B75E2632-1BDA-358F-9C95-DEF0C501193B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A9A6C443-A975-3070-BDA1-2460F12853AF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\88001a027ebf7d771a5edf9193501a9c.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1548 wrote to memory of 4948 1548 regsvr32.exe 84 PID 1548 wrote to memory of 4948 1548 regsvr32.exe 84 PID 1548 wrote to memory of 4948 1548 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\88001a027ebf7d771a5edf9193501a9c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\88001a027ebf7d771a5edf9193501a9c.dll2⤵
- Sets file execution options in registry
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
PID:4948
-