Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Archivariu...A3.dll
windows7-x64
1Archivariu...A3.dll
windows10-2004-x64
3Archivariu...ll.dll
windows7-x64
1Archivariu...ll.dll
windows10-2004-x64
1Archivariu...AI.dll
windows7-x64
6Archivariu...AI.dll
windows10-2004-x64
3Archivariu...00.exe
windows7-x64
6Archivariu...00.exe
windows10-2004-x64
1Archivariu...st.vbs
windows7-x64
1Archivariu...st.vbs
windows10-2004-x64
1Archivariu...ut.htm
windows7-x64
1Archivariu...ut.htm
windows10-2004-x64
1Archivariu...ts.htm
windows7-x64
1Archivariu...ts.htm
windows10-2004-x64
1Archivariu...te.htm
windows7-x64
1Archivariu...te.htm
windows10-2004-x64
1Archivariu...es.htm
windows7-x64
1Archivariu...es.htm
windows10-2004-x64
1Archivariu...ex.htm
windows7-x64
1Archivariu...ex.htm
windows10-2004-x64
1Archivariu...es.htm
windows7-x64
1Archivariu...es.htm
windows10-2004-x64
1Archivariu...ys.htm
windows7-x64
1Archivariu...ys.htm
windows10-2004-x64
1Archivariu...ng.htm
windows7-x64
1Archivariu...ng.htm
windows10-2004-x64
1Archivariu...es.htm
windows7-x64
1Archivariu...es.htm
windows10-2004-x64
1Archivariu...ts.htm
windows7-x64
1Archivariu...ts.htm
windows10-2004-x64
1Archivariu...er.htm
windows7-x64
1Archivariu...er.htm
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 16:31
Behavioral task
behavioral1
Sample
Archivarius 3000/A3.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Archivarius 3000/A3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Archivarius 3000/A3Shell.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Archivarius 3000/A3Shell.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Archivarius 3000/AI.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Archivarius 3000/AI.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Archivarius 3000/Archivarius3000.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Archivarius 3000/Archivarius3000.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
Archivarius 3000/Data/StopList.vbs
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Archivarius 3000/Data/StopList.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Archivarius 3000/Help/Dutch/About.htm
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Archivarius 3000/Help/Dutch/About.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Archivarius 3000/Help/Dutch/Contacts.htm
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
Archivarius 3000/Help/Dutch/Contacts.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Archivarius 3000/Help/Dutch/Create.htm
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Archivarius 3000/Help/Dutch/Create.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Archivarius 3000/Help/Dutch/Features.htm
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
Archivarius 3000/Help/Dutch/Features.htm
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
Archivarius 3000/Help/Dutch/Index.htm
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Archivarius 3000/Help/Dutch/Index.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Archivarius 3000/Help/Dutch/Indexes.htm
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
Archivarius 3000/Help/Dutch/Indexes.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Archivarius 3000/Help/Dutch/Keys.htm
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
Archivarius 3000/Help/Dutch/Keys.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Archivarius 3000/Help/Dutch/Ordering.htm
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
Archivarius 3000/Help/Dutch/Ordering.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Archivarius 3000/Help/Dutch/Queries.htm
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
Archivarius 3000/Help/Dutch/Queries.htm
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
Archivarius 3000/Help/Dutch/Results.htm
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
Archivarius 3000/Help/Dutch/Results.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Archivarius 3000/Help/Dutch/Scheduler.htm
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Archivarius 3000/Help/Dutch/Scheduler.htm
Resource
win10v2004-20240508-en
General
-
Target
Archivarius 3000/AI.dll
-
Size
134KB
-
MD5
8e62bae2e4487a9df1494fb683ff4415
-
SHA1
4af19c3f94cbb2040ffe67ada0801896a5572554
-
SHA256
fb5118df0d5bd5a498e1bb027e4a53684f8792524e79ed275e6be53d62be5f4d
-
SHA512
d6c0082326db7c763ca64c28394cd3a5e38ea1c9eb4b808c329403ec61f144348e58ccab9bdc00577da5ceea0c7039bedcf44639d975599f88c5d7619a96227c
-
SSDEEP
3072:w4QD5C5zDLZdqWbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU71jEJ:w4QdC5DzqYwvP6bQ7yMP+DE8271jEJ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1244 2228 WerFault.exe 28 -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\ToolboxBitmap32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\0\win32\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\HELPDIR rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\HELPDIR\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\Version\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\Programmable rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\Programmable\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\ToolboxBitmap32\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\0\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\FLAGS rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\FLAGS\ = "4" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\VersionIndependentProgID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\Control rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\MiscStatus rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\MiscStatus\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\VersionIndependentProgID\ = "MMCCtrl.MMCCtrl" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\InprocServer32\ = "%SystemRoot%\\SysWow64\\cic.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\ProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\97" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\Version rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\ = "GrooveDVOLogPrivate" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\FLAGS\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\TypeLib\ = "{3F006208-C404-1303-83D0-DA380DCE1E7E}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\ = "Janehes.Hesob class" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\MiscStatus\ = "0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\ProgID\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\ToolboxBitmap32\ = "cic.dll, 1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\Control\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\InprocServer32\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\TypeLib\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\Version\ = "1.0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\VersionIndependentProgID\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\ProgID\ = "MMCCtrl.MMCCtrl.1" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\0\win32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B6963627-819C-4130-308D-7FC0AE26096E}\InprocServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3F006208-C404-1303-83D0-DA380DCE1E7E}\1.0\0 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2228 2352 rundll32.exe 28 PID 2352 wrote to memory of 2228 2352 rundll32.exe 28 PID 2352 wrote to memory of 2228 2352 rundll32.exe 28 PID 2352 wrote to memory of 2228 2352 rundll32.exe 28 PID 2352 wrote to memory of 2228 2352 rundll32.exe 28 PID 2352 wrote to memory of 2228 2352 rundll32.exe 28 PID 2352 wrote to memory of 2228 2352 rundll32.exe 28 PID 2228 wrote to memory of 1244 2228 rundll32.exe 29 PID 2228 wrote to memory of 1244 2228 rundll32.exe 29 PID 2228 wrote to memory of 1244 2228 rundll32.exe 29 PID 2228 wrote to memory of 1244 2228 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Archivarius 3000\AI.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Archivarius 3000\AI.dll",#12⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 2523⤵
- Program crash
PID:1244
-
-