Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 09:11
Behavioral task
behavioral1
Sample
a367de4bf7f4a5c1cfa7ac68dc6817b7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a367de4bf7f4a5c1cfa7ac68dc6817b7.exe
Resource
win10v2004-20240221-en
General
-
Target
a367de4bf7f4a5c1cfa7ac68dc6817b7.exe
-
Size
54KB
-
MD5
a367de4bf7f4a5c1cfa7ac68dc6817b7
-
SHA1
b087f39fa561acd65c6ec35e51d1df46d37e1446
-
SHA256
bdbb1a14e40484f3f44799186ea8006d06c0fd457b7acc9b5d82d1bd3053aa0e
-
SHA512
2dc948f05ee346c31d4d0ca4fe3221662e7959cabca8bc3fb6e70136d65e4556d9c1130f1ad6294cf1c296ce7670014fcbdc6c2165f90517ab9d4e6bdceb2767
-
SSDEEP
1536:3Gi4zOWgjJ4W7LxtuH1YmgtRjhkUZ+uooJiMzfljC:2JzCJ4KLHum/GUhVgsVC
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2888 rundll32.exe -
Deletes itself 1 IoCs
pid Process 2424 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 2636 regsvr32.exe 2888 rundll32.exe 2888 rundll32.exe 2888 rundll32.exe 2888 rundll32.exe 2672 regsvr32.exe -
resource yara_rule behavioral1/memory/2804-0-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2804-10-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2804-23-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{6E28339B-7A2A-47B6-AEB2-46BA53782379} regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\tata_1.dll a367de4bf7f4a5c1cfa7ac68dc6817b7.exe File created C:\Windows\SysWOW64\whew9.dll a367de4bf7f4a5c1cfa7ac68dc6817b7.exe File created C:\Windows\SysWOW64\dllcache\whew9.dll a367de4bf7f4a5c1cfa7ac68dc6817b7.exe File created C:\Windows\SysWOW64\whewb.dll a367de4bf7f4a5c1cfa7ac68dc6817b7.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE.1\CLSID\ = "{6E28339B-7A2A-47B6-AEB2-46BA53782379}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CurVer\ = "TestAtl.ATlMy.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE\ = "EyeOnIE Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\tata_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ProgID\ = "TestAtl.ATlMy.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE.1\ = "EyeOnIE Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379}\InprocServer32\ = "C:\\Windows\\SysWow64\\tata_1.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy.1\ = "ATlMy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\ = "IEyeOnIE" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379}\ProgID\ = "BhoPlugin.EyeOnIE.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}\1.0\HELPDIR\ = "C:\\Windows\\System32" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\TypeLib\ = "{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CLSID\ = "{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\ = "testAtl 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6E28339B-7A2A-47B6-AEB2-46BA53782379}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\ = "IEyeOnIE" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\VersionIndependentProgID\ = "TestAtl.ATlMy" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4CF9A0D2-ED75-40CB-98C0-36DF6A30E040}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BhoPlugin.EyeOnIE\CurVer\ = "BhoPlugin.EyeOnIE.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A2D5957F-6D1A-44CE-BFBA-D448EAAB8781}\1.0\0\win32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 2888 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2636 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 28 PID 2804 wrote to memory of 2636 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 28 PID 2804 wrote to memory of 2636 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 28 PID 2804 wrote to memory of 2636 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 28 PID 2804 wrote to memory of 2636 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 28 PID 2804 wrote to memory of 2636 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 28 PID 2804 wrote to memory of 2636 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 28 PID 2804 wrote to memory of 2888 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 29 PID 2804 wrote to memory of 2888 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 29 PID 2804 wrote to memory of 2888 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 29 PID 2804 wrote to memory of 2888 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 29 PID 2804 wrote to memory of 2888 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 29 PID 2804 wrote to memory of 2888 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 29 PID 2804 wrote to memory of 2888 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 29 PID 2804 wrote to memory of 2672 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 32 PID 2804 wrote to memory of 2672 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 32 PID 2804 wrote to memory of 2672 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 32 PID 2804 wrote to memory of 2672 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 32 PID 2804 wrote to memory of 2672 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 32 PID 2804 wrote to memory of 2672 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 32 PID 2804 wrote to memory of 2672 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 32 PID 2804 wrote to memory of 2424 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 33 PID 2804 wrote to memory of 2424 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 33 PID 2804 wrote to memory of 2424 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 33 PID 2804 wrote to memory of 2424 2804 a367de4bf7f4a5c1cfa7ac68dc6817b7.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a367de4bf7f4a5c1cfa7ac68dc6817b7.exe"C:\Users\Admin\AppData\Local\Temp\a367de4bf7f4a5c1cfa7ac68dc6817b7.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\System32\whewb.dll2⤵
- Loads dropped DLL
- Modifies registry class
PID:2636
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 whew9.dll , InstallMyDll2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\System32\tata_1.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2672
-
-
C:\Windows\SysWOW64\cmd.execmd /c 375519961O57540.bat2⤵
- Deletes itself
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5449d6daa27a54dc934f1d12563148cd5
SHA1afdb6af0efb343e42b052fb1ba6c1b32718a7cf9
SHA256407bfdc0d1d7b79cd5b13d5fbde8ac70ac493045fa5751e94fcf3a546ca34b40
SHA512602e2d030c67542b73aa9c7875ae147ed9f4be55c1cc1d2fd374aca7b9eaac9bf1dba56165da5f7fe1fae68cdd5f738557b5d4e9f352759a71b2643188edf9cb
-
Filesize
32KB
MD57f4d22f6fa861d28bdcb2cce2dcb6cd7
SHA139bab326537d3a94ac67c20d6f3ce0d4814a55fa
SHA256866a865934f9ef9f75125e4e03781ffc245c2e5d67fa2604b731fff185627cd2
SHA51221ecd2b53eef9247ed19ced80b0d5aed1ac1ad1767b78504ad0e758ac19cb5175c76689b311f2b354195fda80bded72ca6deed89fd1d88ee4bbb286aab442bd9
-
Filesize
124KB
MD51fb9c4c3b3be4255065167d457189af2
SHA1a29328e1c31adfb92e2d56a4eb8ba4121cfe2568
SHA256ecf71364c76b2960b1c0a432bcfba50cd9e43be9b6d51f7b6c6b70d0a0dfbc98
SHA51238b974ae75490758780241473c5f98258516b4ce0f94b427a521a5e8c7f021ceaf2321bdd5e9bf3957c1623e8173f087aced466388d656af26d06930c95725eb
-
Filesize
40KB
MD5ca705ced50d4bbed8b2288ef472be488
SHA1db27ff8c14a034d7e614d4614f559f64342c731d
SHA256e1de97782a4be0cf90c721d31fb83e5b5b8eb0281bebfe1b26b6bed741a648e1
SHA5128765b5984dfa84718f6f3a758168bd05549baced78b4cd649df16c5e367d3defb4e37ff7986131ad61b9673c8d95a50fe63eb73034144c56129e80381377dcf8