Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 02:41
Behavioral task
behavioral1
Sample
c87411af487eea2aa942cbbcd4e7fe8af10e1fa417b5a16f7b17907995054aea.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c87411af487eea2aa942cbbcd4e7fe8af10e1fa417b5a16f7b17907995054aea.dll
Resource
win10v2004-20240802-en
General
-
Target
c87411af487eea2aa942cbbcd4e7fe8af10e1fa417b5a16f7b17907995054aea.dll
-
Size
748KB
-
MD5
ae8b2de0064516a6f6a21166250f1d72
-
SHA1
504e7f02faacf99b9e72d6f52b3fbff19efb95ae
-
SHA256
c87411af487eea2aa942cbbcd4e7fe8af10e1fa417b5a16f7b17907995054aea
-
SHA512
e0a2dd2313013cf36c7b3364d493289df494acbb18cd767a2125d69139aad7bdf4087ad1aad51de37b25718d41ad9e4342ca64bcb4ce4a09ae4a3606bfabc1fe
-
SSDEEP
12288:mcQHQv+3pNi3g5zkKf+tqddsN9DYuFuTO6tdFRq6xGJOpqBTG0jdh3W/e0:JKQ2a3grfRjsN9DY/7tdy0Gkp+GaEV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\VersionIndependentProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\VersionIndependentProgID\ = "Shell.Application" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\InProcServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\ = "Microsoft App-V Client 1.0 Type Library" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\HELPDIR\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\TypeLib\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\Version rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\HELPDIR\ = "C:\\Windows\\System32" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\InProcServer32\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\ProgID\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\0 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\0\win32\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\VersionIndependentProgID\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shell32.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\ProgID\ = "Shell.Application.1" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\Version\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\HELPDIR rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\TypeLib\ = "{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\Version\ = "1.0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\FLAGS\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\ = "Okalo.Samemdib object" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A939235-FA65-4D43-7E99-56E3D2834CCC}\ProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\0\ rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\AppVClient.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\ rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\0\win32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\FLAGS rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EA37C2E7-200D-3F65-FDDB-B896822E1C9E}\1.0\FLAGS\ = "0" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4564 3728 rundll32.exe 83 PID 3728 wrote to memory of 4564 3728 rundll32.exe 83 PID 3728 wrote to memory of 4564 3728 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c87411af487eea2aa942cbbcd4e7fe8af10e1fa417b5a16f7b17907995054aea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c87411af487eea2aa942cbbcd4e7fe8af10e1fa417b5a16f7b17907995054aea.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4564
-