Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 15:52

General

  • Target

    ca623a4415c4ab5d0ab5f754e805eec0N.dll

  • Size

    6.7MB

  • MD5

    ca623a4415c4ab5d0ab5f754e805eec0

  • SHA1

    aac96a1fde53fa97d18afb11d24424bffc636797

  • SHA256

    aa18df904fecb08b1433766aae6e78777f8b1626780270973fd0e8429c2be9a5

  • SHA512

    4e6c162bbc27fdf933edbecc9e3837db999fb6914a066a0bbcfcc9c9f81f0cf5096ebc0a8441e0ca02695b5ec0744c8a8fc975a3052e39643b5f94e043df1e5e

  • SSDEEP

    196608:8nBqPnFY0ybc2jCiwaO13rXLoKpK7jG0t8+:sqa14cwhhrxk7jGi8+

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ca623a4415c4ab5d0ab5f754e805eec0N.dll
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:64

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/64-0-0x00007FFC00842000-0x00007FFC00D02000-memory.dmp

    Filesize

    4.8MB

  • memory/64-1-0x00007FFC1F010000-0x00007FFC1F012000-memory.dmp

    Filesize

    8KB

  • memory/64-2-0x00007FFC1F020000-0x00007FFC1F022000-memory.dmp

    Filesize

    8KB

  • memory/64-4-0x00007FFC1F040000-0x00007FFC1F042000-memory.dmp

    Filesize

    8KB

  • memory/64-3-0x00007FFC1F030000-0x00007FFC1F032000-memory.dmp

    Filesize

    8KB

  • memory/64-6-0x00007FFC1F060000-0x00007FFC1F062000-memory.dmp

    Filesize

    8KB

  • memory/64-5-0x00007FFC1F050000-0x00007FFC1F052000-memory.dmp

    Filesize

    8KB

  • memory/64-7-0x00007FFC1F070000-0x00007FFC1F072000-memory.dmp

    Filesize

    8KB

  • memory/64-10-0x00007FFC1F0A0000-0x00007FFC1F0A2000-memory.dmp

    Filesize

    8KB

  • memory/64-8-0x00007FFC1F080000-0x00007FFC1F082000-memory.dmp

    Filesize

    8KB

  • memory/64-9-0x00007FFC1F090000-0x00007FFC1F092000-memory.dmp

    Filesize

    8KB

  • memory/64-12-0x00007FFC1F0C0000-0x00007FFC1F0C2000-memory.dmp

    Filesize

    8KB

  • memory/64-11-0x00007FFC1F0B0000-0x00007FFC1F0B2000-memory.dmp

    Filesize

    8KB

  • memory/64-13-0x00007FFC1F0D0000-0x00007FFC1F0D2000-memory.dmp

    Filesize

    8KB

  • memory/64-14-0x00007FFC1F0E0000-0x00007FFC1F0E2000-memory.dmp

    Filesize

    8KB

  • memory/64-15-0x00007FFC1F0F0000-0x00007FFC1F0F2000-memory.dmp

    Filesize

    8KB

  • memory/64-27-0x00000000024C0000-0x0000000002546000-memory.dmp

    Filesize

    536KB

  • memory/64-30-0x00000000024C0000-0x0000000002546000-memory.dmp

    Filesize

    536KB

  • memory/64-29-0x00000000024C0000-0x0000000002546000-memory.dmp

    Filesize

    536KB

  • memory/64-28-0x00000000024C0000-0x0000000002546000-memory.dmp

    Filesize

    536KB

  • memory/64-31-0x00007FFC007C0000-0x00007FFC013B7000-memory.dmp

    Filesize

    12.0MB

  • memory/64-18-0x00000000024C0000-0x0000000002546000-memory.dmp

    Filesize

    536KB

  • memory/64-17-0x00007FFC1F110000-0x00007FFC1F112000-memory.dmp

    Filesize

    8KB

  • memory/64-16-0x00007FFC1F100000-0x00007FFC1F102000-memory.dmp

    Filesize

    8KB