Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
3d0ef10ef26afa9f47f3fe516eacc168fbd4ff25d8cb037578f02f13c1e204d2N.dll
Resource
win7-20240903-en
General
-
Target
3d0ef10ef26afa9f47f3fe516eacc168fbd4ff25d8cb037578f02f13c1e204d2N.dll
-
Size
209KB
-
MD5
fba7951acedbe89fb0b6ea23d6a80320
-
SHA1
d7aa2a9f9ce614e38547911ce728716cc15bfd33
-
SHA256
3d0ef10ef26afa9f47f3fe516eacc168fbd4ff25d8cb037578f02f13c1e204d2
-
SHA512
17dc5929a57946b4c79bc3ed3b3b6425e9a9e0a54b7a543a3f441ef06ac3085e219288c82af99f612f0c218473957997e920a546ce9d9c8c14e487881fe1fbf4
-
SSDEEP
3072:iLaTjeSgIjbpwwJrV5A5TkzykDho+7JTpJ7WG/waF5OZwSEHPIge:KanPdROmerGBF5SwSEAge
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 regsvr32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
resource yara_rule behavioral2/files/0x000800000002361f-5.dat upx behavioral2/memory/2064-7-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1040 2064 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4304 wrote to memory of 4336 4304 regsvr32.exe 89 PID 4304 wrote to memory of 4336 4304 regsvr32.exe 89 PID 4304 wrote to memory of 4336 4304 regsvr32.exe 89 PID 4336 wrote to memory of 2064 4336 regsvr32.exe 90 PID 4336 wrote to memory of 2064 4336 regsvr32.exe 90 PID 4336 wrote to memory of 2064 4336 regsvr32.exe 90
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3d0ef10ef26afa9f47f3fe516eacc168fbd4ff25d8cb037578f02f13c1e204d2N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3d0ef10ef26afa9f47f3fe516eacc168fbd4ff25d8cb037578f02f13c1e204d2N.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 2644⤵
- Program crash
PID:1040
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2064 -ip 20641⤵PID:1192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3904 /prefetch:81⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5368c6653018fffc8902b3404f1330c5f
SHA111222508abc7a16e6d5004b92645c22173bd805c
SHA256322b8fe73a8f4d60627aac70bad1e724e2a8e4b605ac3b1cec96cd9029591825
SHA512108afbb6af60e2fd445cc9494b901b604ec353b39c1d6e36a47f27a877d0696241b128134c4471c22f94bde2adffab0efb871b80708369412d9179f3b672a756