Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 23:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a09e51639535870e1657950369739155.dll
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a09e51639535870e1657950369739155.dll
Resource
win10v2004-20240221-en
3 signatures
150 seconds
General
-
Target
a09e51639535870e1657950369739155.dll
-
Size
264KB
-
MD5
a09e51639535870e1657950369739155
-
SHA1
27ec147586ba7f8dd9dfdc80078b6cd1981aba13
-
SHA256
5403089ea8abec9a9b3e7377db420f3fe64f9aa99ac1f521e027e93a6559c422
-
SHA512
b72c7aaa5d2fceabf3ea4e01df278f094284af357f081668bdca14917e2ff353bea2bda9e32912eacbe6fc1931fe6e9d8b4075701b4ae43d06365e913e9a0121
-
SSDEEP
3072:zy26eu1sMb8wN57n2uadQ4lqw9oNXzKOXsjJkyhotRHP8ycVZc+BxtzDCw8:zyfzgOfyhKv8ycVZV/u
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vbgtorfd = "{272D96D7-8517-4A6E-B5D1-A69C1440959C}" rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{272D96D7-8517-4A6E-B5D1-A69C1440959C}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{272D96D7-8517-4A6E-B5D1-A69C1440959C} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{272D96D7-8517-4A6E-B5D1-A69C1440959C}\InProcServer32\ = "C:\\Windows\\vbgtorfd.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2420 1316 rundll32.exe 28 PID 1316 wrote to memory of 2420 1316 rundll32.exe 28 PID 1316 wrote to memory of 2420 1316 rundll32.exe 28 PID 1316 wrote to memory of 2420 1316 rundll32.exe 28 PID 1316 wrote to memory of 2420 1316 rundll32.exe 28 PID 1316 wrote to memory of 2420 1316 rundll32.exe 28 PID 1316 wrote to memory of 2420 1316 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a09e51639535870e1657950369739155.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a09e51639535870e1657950369739155.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2420
-