Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 03:09 UTC

General

  • Target

    24d46246bc05c4e3b67643cae1d13bb0N.dll

  • Size

    681KB

  • MD5

    24d46246bc05c4e3b67643cae1d13bb0

  • SHA1

    ce522ad00bd8748d2936bb21a66e53f8fb137f13

  • SHA256

    d81896305cdcf7dab9402e359d4f83af1c430bbd1b1efe18e778c285e257b324

  • SHA512

    c81c9bd421e2b84d277ff999d632febe5de2f3a2190c040b4f3475edd46c127162e0051681841e72b8a260209304b1eac52f6dfb12c6f1e6fcc13925071677f8

  • SSDEEP

    6144:DvRVevCGg+9++Pxn7wvKouwMoHbBanrB1Ze8zEr5ZULTJJB+LT0WuM4fnf4A2t1c:DvLeX347QZ7/2t1Lq1Lu0

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 17 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\24d46246bc05c4e3b67643cae1d13bb0N.dll
    1⤵
    • Modifies registry class
    PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.