Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1List of su...ts.lnk
windows7-x64
10List of su...ts.lnk
windows10-2004-x64
10List of su...ll.dll
windows7-x64
1List of su...ll.dll
windows10-2004-x64
1List of su...es.pdf
windows7-x64
1List of su...es.pdf
windows10-2004-x64
1List of su...40.dll
windows7-x64
3List of su...40.dll
windows10-2004-x64
3List of su...gr.dll
windows7-x64
1List of su...gr.dll
windows10-2004-x64
3List of su...rv.exe
windows7-x64
10List of su...rv.exe
windows10-2004-x64
10List of su...dt.dll
windows7-x64
1List of su...dt.dll
windows10-2004-x64
1List of su...40.dll
windows7-x64
List of su...40.dll
windows10-2004-x64
3List of su...ce.dll
windows7-x64
1List of su...ce.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
List of suspected clients/List of suspected clients.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
List of suspected clients/WCLDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
List of suspected clients/WCLDll.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
List of suspected clients/moorefiles.pdf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
List of suspected clients/moorefiles.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
List of suspected clients/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
List of suspected clients/msvcp140.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
List of suspected clients/ptMgr.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
List of suspected clients/ptMgr.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
List of suspected clients/ptSrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
List of suspected clients/ptSrv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
List of suspected clients/ptusredt.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
List of suspected clients/ptusredt.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
List of suspected clients/vcruntime140.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
List of suspected clients/vcruntime140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
List of suspected clients/wbxtrace.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
List of suspected clients/wbxtrace.dll
Resource
win10v2004-20240226-en
General
-
Target
List of suspected clients/ptusredt.dll
-
Size
165KB
-
MD5
3c3e960d59cb413791fee1e944b6df72
-
SHA1
4aa6c90d81692642ca8266bf0d8e249ff3e3ad54
-
SHA256
88378c228d7827974fe6ec827837af7571290e129082e7070d4bff7a42f4ba67
-
SHA512
85b471aa2a066c6a779384ed102b895af108af51cd718bb834cda107f71bf5e6fcd8ecc77e9ea4fd7fd3ddbc10b1f57870a9bafcbbfa1be8e2ba224651d77aac
-
SSDEEP
3072:Ze0HJrRJW9+tjxQGsfzeV0YuNmu5uWj5ONq/1epLcv60H9+v:8SrRJGeNsry0hmuqRoy0H9u
Malware Config
Signatures
-
Modifies registry class 31 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\VersionIndependentProgID\ = "UserEditHelp.UserNameHolder" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder\ = "UserNameHolder Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder\CurVer\ = "UserEditHelp.UserNameHolder.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\ProgID\ = "UserEditHelp.UserNameHolder.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\List of suspected clients\\ptusredt.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder.1\ = "UserNameHolder Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\TypeLib\ = "{A15A1C00-9788-44D9-AA0A-723F170887CF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\List of suspected clients" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder.1\CLSID\ = "{E8D0CE8D-BC70-4025-978F-E86068362730}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\ = "UserNameHolder Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\List of suspected clients\\ptusredt.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder\CLSID\ = "{E8D0CE8D-BC70-4025-978F-E86068362730}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UserEditHelp.UserNameHolder regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8D0CE8D-BC70-4025-978F-E86068362730}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\ = "UserEditHelp 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A15A1C00-9788-44D9-AA0A-723F170887CF}\1.0\FLAGS\ = "0" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1892 2192 regsvr32.exe 29 PID 2192 wrote to memory of 1892 2192 regsvr32.exe 29 PID 2192 wrote to memory of 1892 2192 regsvr32.exe 29 PID 2192 wrote to memory of 1892 2192 regsvr32.exe 29 PID 2192 wrote to memory of 1892 2192 regsvr32.exe 29 PID 2192 wrote to memory of 1892 2192 regsvr32.exe 29 PID 2192 wrote to memory of 1892 2192 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptusredt.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\List of suspected clients\ptusredt.dll"2⤵
- Modifies registry class
PID:1892
-